@book{ddebc88afba44211abd2acf076000982,
title = "Two methodologies for physical penetration testing using social engineering",
abstract = "During a penetration test on the physical security of an organization, if social engineering is used, the penetration tester directly interacts with the employees. These interactions are usually based on deception and if not done properly can upset the employees, violate their privacy or damage their trust towards the organization, leading to law suits and loss of productivity of the organization. This paper proposes two methodologies for performing a physical penetration test where the goal is to gain an asset using social engineering. These methodologies aim to reduce the impact of the penetration test on the employees. The methodologies are validated by a set of penetration tests we did in a period of two years.",
keywords = "SCS-Cybersecurity, METIS-264260, EWI-17043, physical security, IR-69064, Penetration Testing, Research ethics, Methodology, Social Engineering",
author = "T. Dimkov and Wolter Pieters and Hartel, {Pieter H.}",
year = "2009",
month = dec,
day = "17",
language = "Undefined",
series = "CTIT Technical Report Series",
publisher = "Centre for Telematics and Information Technology (CTIT)",
number = "TR-CTIT-09-48",
address = "Netherlands",
}