Let’s bypass another door we don’t have access to! The Bypassing Doors blog series demonstrates easy-to-use tools and techniques that can be utilized to bypass an organization’s interior and exterior doors. In this part 3 post, we will be talking specifically about utilizing a piece of paper! What?!?! Yep! That is exactly what I thought at first – but a simple piece of paper will bypass your building’s door.
More often than not, buildings are equipped with a “Request to Exit” sensor, or REX sensor. These sensors are implemented due to various regulations and building code requirements.
The images below show the Request to Exit sensor (REX sensor) and the way it looks on a door. Typically, these sensors make use of Passive Infrared (PIR) for detection of motion. PIR detects changes in temperature within the area of its field of view. A piece of paper can be tossed under the door frame and creates a sense of motion that triggers the sensor. This opens the door and allows one access inside – WITH ONLY A PIECE OF PAPER!
Photo of a Request to Exit sensor (REX sensor):
Photo of a Request to Exit sensor installed above a door:
Pictured below the bypassing tool, a terrifying stack of paper!
Here is a video of bypassing a REX sensor door with a piece of paper:
There are multiple prevention options that can be implemented to prevent bypassing with paper. These options include the following:
By moving the REX sensor further away from the door, it can prevent the trigger from sensing indirect motion.
Install kick plates to prevent items like paper, from sliding items under your doors by minimizing any gap beneath the door.
Implement rubber moldings to prevent unauthorized tools, like paper, from sliding under the door.
Like rubber moldings, the door shoe adjusts to prevent anything from being shoved under your door.
If you missed part 1, check out the UTDT post. Here’s part 2, the DDT post. More physical pentesting tools and bypassing overviews are being published soon, so stay tuned for part 4!
Cyber Advisors specializes in providing fully customizable cyber security solutions & services. Our knowledgeable, highly skilled, talented security experts are here to help design, deliver, implement, manage, monitor, put your defenses to the test, & strengthen your systems - so you don’t have to.
Read more from our technical experts...