In this episode of How Do Hackers Do Things, GraVoc Security Consultant, Josh Jenkins, will show you how hackers can attempt to steal HID (Human Interface Device) Badges using a Proxmark3. The Proxmark3 is a commercially available hardware device that allows a malicious actor to steal and copy a wide array of badges. This type of attack could allow an attacker to physically enter a facility and plant other devices that would allow for further exploitation. Check out the demonstration below!
In order to prevent attacks like these from happening, it is important to fully understand your external vulnerability attack surface. This would typically get done through an External Vulnerability Assessment and Penetration Testing. External Vulnerability Assessment and Penetration Testing simulates a targeted, external attack on your organization’s network perimeter. For more information on protecting your business from these types of attacks, visit our External Vulnerability Assessment & Penetration Testing services.
How Do Hackers Do Things Series
If you enjoyed this video, make sure to check out our other How Do Hackers Do things videos for more great security videos and tips! How Do Hackers Do Things focuses on different methods of hacking that cybercriminals use to exploit their victims. Our goal is bring awareness to the vulnerabilities and hacking methods that surround our everyday lives!
Every business should have a system in place for Password Management. In this article, we examine why passwords are a top target for cybercriminals and what your business can be doing to protect and manage your passwords.
Join us virtually on Thursday, September 9th, 2021 from 4:00pm-5:30pm for an overview of how you can protect your business from ransomware & other cybersecurity threats.
In this article, we explore what Personally Identifiable Information (PII) is and why individuals and organizations need to ensure the security of this sensitive data.