1

Initial Client Engagement

The foundation of any physical pentest begins with understanding the client's needs, scope, and objectives. This phase establishes the legal framework and defines success criteria.

Critical Requirement

All physical penetration testing must be explicitly authorised in writing before any testing begins. Unauthorised testing is illegal and unethical.

2

Reconnaissance & Intelligence Gathering

Understanding the target environment through passive observation and research. This phase focuses on gathering information without direct interaction with security systems.

3

Threat Modeling & Attack Planning

Developing realistic attack scenarios based on gathered intelligence. This phase translates observations into actionable testing strategies while maintaining ethical boundaries.

4

Active Testing Execution

The hands-on phase where theoretical vulnerabilities are validated through careful, controlled testing. Focus on methodical approach while minimizing disruption.

5

Evidence Documentation

Comprehensive recording of findings, methodologies, and impact assessment. Documentation must be detailed enough for replication and remediation guidance.

6

Risk Assessment & Prioritisation

Analysis of discovered vulnerabilities in the context of business impact and likelihood of exploitation. This phase translates technical findings into business language.

7

Remediation Recommendations

Practical, implementable solutions for identified vulnerabilities. Recommendations should be prioritised, realistic, and considerate of operational requirements.

8

Final Reporting & Knowledge Transfer

Comprehensive documentation delivery with executive summary, technical details, and actionable remediation guidance. Clear communication ensures findings drive meaningful security improvements.

Core Principles

Authorisation First

Never conduct testing without explicit written permission and clear scope boundaries.

Minimal Impact

Prove vulnerabilities exist without causing operational disruption or damage.

Systematic Methodology

Follow repeatable processes that can be documented and verified by others.

Evidence-Based

Every finding must be supported by concrete evidence and reproduction steps.

Client-Focused

Recommendations must be practical, implementable, and aligned with business objectives.

Continuous Learning

Each engagement provides opportunities to refine methodology and improve outcomes.