How I Got In: Bypassing Bank Security (Part 2)

by | Jul 4, 2025 | How I Got In








Phase 5: Night Entry at the Second Operations Center


Physical social engineering gear


Canned air attack against egress sensor


Physical penetration testing with wall opening to bypass door



Regular printer in empty office


Mortise style lock


file room storage


Cashiers check box




Stack of Cashiers Checks in Box









Phase 5 & 6: Second Operations Center Night Entry



What kind of physical bypass tools were used?

Everything was low-tech and discreet. We used a latch shim to bypass a standard office doorknob lock. We raked open a wafer lock on a key cabinet to retrieve a key for a metal lockbox. We used a basic three-digit combination cycling method to open shred bins. All tools were small, legal to carry, and non-destructive. A copper wire and a can of air to bypass egress sensors.
.

What sensitive data was exposed?

We found and photographed official preprinted cashier’s checks stored in an unsecured lockbox, inside a room accessed using a shim. We accessed the key to that box by opening a poorly secured key cabinet. We also found partially shredded checks, client information, and internal forms inside unlocked shred bins. All evidence was documented and immediately reported to the client.
.

What would have stopped these attacks?

Many of these compromises could have been prevented with simple changes. Stronger locks, secured key storage, proper keypad shielding, proper SPF/DKIM/DMARC configuration, visitor validation protocols, and more consistent staff training would have made a major difference. We provided a full list of mitigations and prioritized recommendations in our report.
.

Did anyone notice you during the test?

Not once. At no point was I seriously challenged, questioned, or confronted at any location. Receptionists handed out badges without verification. Employees assumed I belonged. No security alerts were triggered, and no one followed up on the spoofed communications during the branch bank pretext. The assessment remained undetected from start to finish.
.

Was anything damaged or tampered with?

No. All activity was nondestructive, performed with the intent to restore the environment exactly as we found it. Doors, locks, network equipment, and documents were left untouched beyond observation and documentation. No systems were altered, and no persistent access remained.
.

How long did this assessment take?

The full engagement spanned several days, including on-site observation, business-hour and after-hours testing, and internal network activity. The after-hours entry and building compromise took less than an hour. Each individual operation was tightly scoped to stay within the engagement boundaries.

Have any questions?

Fill out the form below

Leading-Edge Penetration Testing

Services