TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

A team paid to break into top-secret bases

56 点作者 tellarin7 个月前

16 条评论

tptacek7 个月前
Every large information security firm in the market offers physical pentesting, and most large in-house security teams do semi-regular physical pentesting. I was hoping this would be a story about the complications of doing physical pentesting on sites where the use of deadly force is authorized, but instead it's an article of the type you'd have expected to read in the late 1990s, when this stuff was exotic.
评论 #41851953 未加载
评论 #41852137 未加载
评论 #41854458 未加载
maximilianroos7 个月前
&gt; He prefers his own “escalatory approach”, working through a system via an administrator’s access and searching for a “confluence”, a collection of information shared in one place, such as a workplace intranet.<p>Was this a mistaken transcription for Confluence, the Atlassian app?
评论 #41851608 未加载
评论 #41852282 未加载
评论 #41851662 未加载
评论 #41851999 未加载
评论 #41852237 未加载
评论 #41851841 未加载
flkiwi7 个月前
Ok, so, assuming these facilities are indeed &quot;top secret bases&quot; that have armed security, military or otherwise, how do red teamers not get shot? Do they get right up to but not complete the intrusion? Do they inform security of the intrusion attempt and, if so, how do they defend against the hilarious possibility of actual baddies working at the same time?<p>These questions might have obvious answers. This isn&#x27;t my line of work. I&#x27;m honestly interested in how they accommodate the need to (a) not kill the vendor and (b) still protect the facility.
评论 #41852386 未加载
throwup2387 个月前
In the US we just outsource the job to nuns: <a href="https:&#x2F;&#x2F;en.m.wikipedia.org&#x2F;wiki&#x2F;Megan_Rice" rel="nofollow">https:&#x2F;&#x2F;en.m.wikipedia.org&#x2F;wiki&#x2F;Megan_Rice</a>
ctippett7 个月前
The Darknet Diaries podcast features a lot of fascinating first-hand accounts of penetration testers breaking into places.<p>One of my favourite episodes is the account of two people breaking into a US courthouse[1], it&#x27;s both exhilarating and terrifying.<p>[1] <a href="https:&#x2F;&#x2F;darknetdiaries.com&#x2F;transcript&#x2F;59&#x2F;" rel="nofollow">https:&#x2F;&#x2F;darknetdiaries.com&#x2F;transcript&#x2F;59&#x2F;</a>
评论 #41853280 未加载
lazyeye7 个月前
FreakyClown (ethical hacker) has a recent book on this subject<p>How I rob banks<p><a href="https:&#x2F;&#x2F;www.amazon.com&#x2F;How-Rob-Banks-Other-Places&#x2F;dp&#x2F;1119911478" rel="nofollow">https:&#x2F;&#x2F;www.amazon.com&#x2F;How-Rob-Banks-Other-Places&#x2F;dp&#x2F;1119911...</a>
Molitor59017 个月前
Interesting but it ended so.. abruptly! I was hoping for a LOT more. I think if you&#x27;re interested in this subject area you must get a copy of Ghost In The Wires, and The Art of Intrusion by Kevin Mitnick.
caprock7 个月前
It would be fun to read a detailed writeup for just one successful infiltration. All the small details, step by step.<p>Anyone have any movie recommendations for a more modern version of Sneakers (great movie)?
评论 #41851642 未加载
count7 个月前
Is this an ad for Leonardo? &#x27;Greg would only speak to BBC under a pseudonym&#x27;...really? There are many professional, military-or-adjacent red team folks who&#x27;d gladly speak to BBC with real names and credentials...
评论 #41851232 未加载
评论 #41851224 未加载
NoPicklez7 个月前
Annoying that the article is more focused on &quot;there&#x27;s people that get paid to break into things&quot; more so than &quot;these are the complexities of breaking into a base&quot;.<p>Physical pentesting or red teaming isn&#x27;t anything new
amatecha7 个月前
Hmm, feels like the article could have been so much longer.. it&#x27;s a pretty cool topic. Sadly, all the 1-or-2-sentence paragraphs makes it feel like a Goosebumps novel or something. Really awkward presentation.
1970-01-017 个月前
How does one get into the physical security space? I can pick a lock, climb a ladder, jump a gap, and lie to authorities.. I would love to do this for a job.
评论 #41851629 未加载
评论 #41851729 未加载
yellow_lead7 个月前
&gt; The objective might be to stop a process from working, such as the core of a nuclear power plant.<p>This sounds quite difficult, if not impossible :)
评论 #41851490 未加载
评论 #41851442 未加载
Prbeek7 个月前
It looks like they target firms&#x2F;premises without a centralized biometric access.
jlg237 个月前
Uh. So what?<p>At a European hacker con we had the custom of keeping crew badges in the first room to be occupied by us and our security. To get your crew badge, you had to get into that room without authorization.<p>Everyone worthy of being called &quot;crew&quot; did succeed.
farceSpherule7 个月前
Yes, these are called red teams and this has been a thing for decades.<p>Why is this relevant to Hacker News?
评论 #41852503 未加载