How I Got In: Bypassing Bank Security (Part 1)

by | Jul 4, 2025 | How I Got In









Bank Operations Center



Reception area of bank


cubicle during physical penetration test



wifi bridged adapter



MS17-010 Vuln


Same local administrator password hash on fifty three systems



Branch Access Policy


Branch bank network closet









How did you prepare for the engagement?

At the start of the assessment, we coordinated with the client to confirm scope, timing, and rules of engagement. We also visited the local sheriff’s office in advance and provided them with a letter explaining the test, complete with contact info for the client and our team. That way, if an alarm was triggered or someone called in suspicious activity, law enforcement would know this was an authorized assessment. They’d still respond, but they’d have context before escalating. We also did as much recon work as we could online about the organization, buildings, layout, personnel, etc., before getting onsite.
.

Were pretexts and impersonation part of the scope?

Yes. The client authorized both social engineering and physical testing. We used multiple pretexts, including impersonating an internal auditor and posing as an IT contractor. The branch bank job involved spoofing a phone number and sending a matching spoofed email with a fake technician identity. The client approved these methods in writing, with the condition that nothing be damaged and no internal help be used.
.

How did you access the internal network?

At one location, we plugged into a live network port and were issued a DHCP lease immediately. At another, where 802.1x was properly implemented, we printed a configuration sheet from a networked printer, cloned its MAC address, unplugged the printer, and received network access by impersonating it. All actions were non-destructive and fully reversible.
.

How did you get into the buildings?

Each location had different weaknesses. In one, we tailgated and received a visitor badge by blending in with an arriving audit team. In another, we captured a keypad code by watching someone enter it. At the second operations center, we entered after hours by bypassing a touch-sensitive door using a copper wire, then defeated a PIR egress sensor with canned air. Later, we climbed through an architectural gap next to a locked stairwell door.
.

Did you plant any hardware?

Yes, but only during earlier phases. We planted a wireless access point behind a printer at the first operations center, which allowed us to access the internal network from the parking lot. In the later phases, we used only a laptop to connect briefly and gather findings. No persistent hardware was left in place after testing.
.

Have any questions?

Fill out the form below

Leading-Edge Penetration Testing

Services