BYPASS BARRIERS TO IDENTIFY WEAKNESSES

Physical Pentesting

Our Approach to Physical Security Assessments

Adversaries aren't constrained to your digital environment - your security shouldn't be either

We put your physical security defences to the ultimate test by simulating intrusions using the same tactics, techniques and procedures as skilled real-world adversaries.

Our red team testers aim to defeat the physical prevention, detection and response capabilities within your offices, data centres and critical infrastructure facilities in order to identify technical and systemic weaknesses.

After our assessment, you'll be equipped with the corrective actions needed to demonstrate to regulators, third parties, and customers your commitment to securing your business against the highest industry standards.

Our Physical Pentesting Arsenal & Expertise is Unmatched.

Our security experts leverage cutting-edge tactics and tools just as a real-world attackers would - to identify susceptible controls and defensive blind spots within your equipment, barriers, doors, locks, cameras, fences, alarms and even security guards.

Lock Picking

Door / Gate Bypass

Dumpster Diving

RFID Cloning

Perimeter Mapping

Social Engineering

Tailgating

RF Interception

Surveillance Analysis

Response Time Analysis

Related Resources

Take a look at some of these Physical Security related resources

...

ASEC Tradecraft Referenced by ATT&CK

We shed light into what Hardware Additions are used by adversaries in our BSidesTO Presentation: Weapons of a Pentester.

...

DEFCON Toronto's First Workshop on Lock Picking

ASEC & DEFCON Toronto Founder Nick Aleks, showcases an interactive lock picking session at community's first event.

...

Snap Gun & RF Physical Bypassing at Sector

Sector Conference gets hands-on demo of physical security bypass methods using snap gun and radio replay techniques from ASEC Founder Nick Aleks.

Community is everything.

For over 8 years we've cultivated and supported some of Toronto's local security communities. We believe giving back and investing in the future generations of information security is a must.

Learn about our Intern & Education Program
...
...
...

Ready to start hacking?

We're here to help you identify and address risks and accelerate your proactive security journey.

Let's Go

This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media. To find our more about the cookies we use, see our Privacy Statement.

If you decline, your information won't be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.