Case Study

Social Engineering the Reception Desk

> operator@field:~# echo 'No exploit required. Just a lanyard and a smile.'<span class="cursor-blink">_</span>_

Peter Bassill 5 November 2024 16 min read
penetration-testing social-engineering physical-security from-the-hacker-desk pretexting human-factors security-awareness red-team

No exploit. No malware. Just a conversation.

This article is different from the others in this series. There are no Nmap scans. No Mimikatz output. No firewall rule analysis. No CVE numbers. The tools used in this engagement were a high-visibility vest, a clipboard, a lanyard with a printed badge, a mobile phone, and a carefully rehearsed story.

Social engineering — the manipulation of human behaviour to bypass security controls — is the oldest and most reliable attack vector in existence. It predates computers. It predates electricity. It works because it targets the one component of any security system that cannot be patched, reconfigured, or replaced: the human being.

On this engagement, we gained access to a server room, an executive floor, an HR filing area containing personnel records, and a network cabinet — all without any technical exploitation whatsoever. Every door was opened for us by a person who believed they were doing the right thing.


The Engagement Brief

The client was a financial services company occupying four floors of a shared commercial building in a major city. They employed approximately six hundred staff across front-office, back-office, and technology functions. The building had a shared ground-floor reception managed by the building landlord, with the client's own reception desk on the second floor — their primary entry point for visitors.

We had been engaged to conduct a physical social engineering assessment. The scope was explicit: we were authorised to attempt to gain access to the client's office space through social engineering techniques — pretexting, impersonation, tailgating, and manipulation. We were not authorised to pick locks, defeat electronic access controls through technical means, or use any form of force or intimidation. We were not permitted to access live customer data. If challenged and unable to talk our way past the challenge, we were to disengage and try a different approach.

A letter of authorisation, signed by the Chief Security Officer, was carried by each team member at all times. If stopped by security or police, we would produce the letter immediately and cease all activity. The safety of our team and the client's staff was the overriding priority.

The client's security team knew that an assessment was taking place 'within the current quarter' but did not know the date, the method, or the pretext. The reception staff, facilities team, and general employees had no knowledge of the assessment.


Reconnaissance — Learning the Human Landscape

Technical penetration tests begin with network scanning. Social engineering engagements begin with observation. We spent three days conducting reconnaissance before attempting any access. This reconnaissance was entirely passive — no interaction with any employee, no physical entry to the building beyond the public ground-floor lobby.

The intelligence we gathered fell into three categories.

Physical Observation
We observed the building entrance during morning arrival (07:30–09:30), lunchtime (12:00–14:00), and evening departure (17:00–19:00) across three days. We noted the flow of people, the behaviour of the ground-floor security desk, the use of access badges, the frequency of deliveries, and the patterns of contractors entering and leaving. We observed that the ground-floor security guard signed in visitors but did not verify identity against photographic ID. Contractors in high-visibility clothing were waved through with minimal scrutiny.
Online Intelligence
LinkedIn provided the organisational structure, recent hires, team names, and the names of key individuals including the facilities manager, the IT service desk lead, and the office manager. The company's own website listed the names of its senior leadership and their professional headshots. Social media posts from employees disclosed the office layout, the kitchen locations, the style of ID badges worn on lanyards, and — in one particularly helpful Instagram post — the exact design of the visitor badge.
Telephone Reconnaissance
We called the main switchboard and, posing as a supplier's accounts team, confirmed the name of the facilities manager, the process for arranging contractor access, and the fact that contractor visits were arranged via email to facilities rather than through a centralised visitor management system. A second call, posing as a courier company, confirmed the location of the loading bay and the process for deliveries — unescorted access via the service lift to the mailroom on the second floor.

By the end of the reconnaissance phase, we had a detailed understanding of the building's access procedures, the client's visitor management process, the names and roles of key gatekeepers, the physical layout of the office, and the visual appearance of staff and visitor badges. We had not yet entered the building.


Pretext Development — Becoming Someone Else

A pretext is a fabricated scenario that provides the social engineer with a plausible reason to be where they are, doing what they are doing. A good pretext is not a disguise — it is a role. It comes with a backstory, a purpose, an expected set of behaviours, and answers to the questions that people might ask.

We developed three pretexts for this engagement, each designed for a different access scenario.

Pretext Target Access Supporting Props
Fire Safety Auditor
Conducting a scheduled fire safety inspection on behalf of the building management company
All floors, all areas including server room and restricted zones — fire safety auditors require access to check fire exits, extinguisher locations, and cable management High-visibility vest, clipboard with printed fire safety checklist, branded lanyard (building management company name), digital camera (mobile phone)
IT Contractor
Sent by the managed service provider to investigate a reported cabling fault on the fourth floor
IT areas, network cabinets, comms rooms, under-desk access Polo shirt with generic IT services branding, tool bag, cable tester, laptop bag, printed work order referencing a ticket number
New Employee
Starting today in the compliance team, directed to report to reception on the second floor
General office areas, kitchen, meeting rooms — testing whether reception verifies new starter identity Smart business attire, laptop bag, printed 'offer letter' on company letterhead (fabricated), nervous demeanour

Each pretext was rehearsed. We anticipated the questions we would be asked — Who arranged this? Who are you here to see? Do you have a reference number? Can I see some ID? — and prepared answers that were specific, confident, and verifiable to the extent that a receptionist would be unlikely to check further.

The pretexts exploited three specific psychological principles that underpin successful social engineering.


Why Social Engineering Works

Authority
People comply with requests from perceived authority figures. A fire safety auditor carries the implicit authority of the building management company and regulatory compliance. Refusing access risks obstructing a safety inspection — a consequence that most people are unwilling to accept. The high-visibility vest and clipboard reinforce the authority cue before a word is spoken.
Social Proof and Conformity
If a person appears to belong — wearing the right clothes, carrying the right props, behaving in the expected manner — others will assume they have been through the correct process. Nobody questions the person in the high-vis vest walking purposefully through the office, because people in high-vis vests walk purposefully through offices every day.
Helpfulness and Courtesy
Reception staff are hired, trained, and evaluated on their ability to be helpful and welcoming. Turning someone away is an act of confrontation that contradicts their professional instincts. A social engineer exploits this by being polite, reasonable, and slightly inconvenienced — creating a situation where the path of least social resistance is to help.

These principles are not weaknesses in individual people. They are features of human social behaviour — deeply ingrained patterns that enable cooperation, trust, and efficient social interaction. Social engineering works precisely because these behaviours are normally beneficial. The social engineer exploits the gap between the world as it usually is (where people in high-vis vests are legitimate contractors) and the world as it occasionally is (where they are not).


The Fire Safety Auditor

Tuesday, 09:15. We arrived at the building's ground-floor entrance wearing a high-visibility vest over a white shirt, carrying a clipboard and wearing a lanyard bearing the name and logo of the building management company — information obtained from the management company's website and reproduced on a colour printer.

We approached the ground-floor security desk.

'Morning. I'm here for the fire safety walk-through — we've got the quarterly inspection booked in for the second, third, and fourth floors. Should be a couple of hours. Has the facilities team left a pass for me, or do I sign in with you?'

The security guard looked at the clipboard, looked at the lanyard, and asked for a name. We gave a name. He wrote it in the visitor log. He did not ask for photographic identification. He did not call the client's facilities team to verify the appointment. He did not check the booking system. He issued a generic building visitor badge and directed us to the lifts.

We were in the building.

On the second floor — the client's reception — we walked past the reception desk without stopping, clipboard in hand, looking purposeful. The receptionist glanced up. We held up the building visitor badge and said 'Fire safety — just doing the quarterly walk-through' without breaking stride. She nodded and returned to her screen.

We were through reception.

Fire Safety Auditor — Access Timeline
09:15 Arrived at ground-floor security desk
09:17 Signed visitor log — no ID check — building badge issued
09:19 Passed client reception desk — no challenge
09:22 Accessed second-floor office space — open plan area
09:28 Accessed server room — door held open by staff member leaving
09:35 Photographed server racks, cabling, access control panel
09:42 Accessed third floor — badge-controlled door, tailgated
09:48 Accessed network cabinet on third floor (unlocked)
09:55 Accessed fourth floor — executive area
10:02 Entered empty executive office — photographed documents on desk
10:10 Exited building via ground floor — thanked security guard

Total time inside: 53 minutes
Areas accessed: Reception, open plan (3 floors), server room,
network cabinet, executive floor, executive office
Challenges received: 0

Fifty-three minutes. Four floors. The server room, a network cabinet, and an executive office. Zero challenges. Nobody asked to see identification beyond the fabricated lanyard. Nobody called facilities to verify the inspection. Nobody questioned why a fire safety auditor was photographing server racks. Nobody asked us to leave.

The server room access was particularly notable. The door was controlled by a proximity card reader. We did not have a valid card. We stood outside the door, clipboard in hand, looking expectantly at the card reader. Within ninety seconds, a member of the IT team emerged from the server room carrying a cup of coffee. We stepped forward and caught the door. 'Cheers — fire safety, just need to check the extinguisher dates and the cable runs.' He held the door open and walked away.

Finding — Server Room Access via Tailgating

The server room was accessed by tailgating a staff member through a badge-controlled door. No verification of identity or authorisation was requested. The fire safety auditor pretext provided sufficient social justification for the staff member to hold the door open without question.


The IT Contractor

Wednesday, 13:45. A different team member arrived at the building wearing a branded polo shirt (a generic IT services company name, purchased online), carrying a tool bag and a laptop bag. The timing was deliberate — the early afternoon, when the post-lunch energy dip makes people less alert and more willing to process routine interactions on autopilot.

At the ground-floor security desk: 'Afternoon. I've got a ticket to look at a cabling fault on the fourth floor — your IT team called it in this morning. Should be a quick one.' We produced a printed work order — a fabricated document referencing a plausible ticket number, the client's company name, and the name of the IT service desk lead (obtained from LinkedIn).

The guard signed us in. No ID check. No verification call.

On the second floor, we approached the client's reception desk directly. 'Hi — I'm from [IT services company], here to look at a network fault on the fourth floor. [IT service desk lead name] raised the ticket this morning. Is there someone from IT who can show me where the cabinet is?'

The receptionist called the IT service desk. The person who answered did not recognise the ticket number — unsurprisingly, since it did not exist. But rather than refusing access, they asked the receptionist to send the contractor up and said someone would meet them on the fourth floor. Nobody met us. We waited in the fourth-floor corridor for five minutes, then began working — opening the unlocked network cabinet, photographing the switch configuration, and noting the cabling labels.

After fifteen minutes, a junior IT staff member appeared. 'Are you the cabling guy? Sorry, nobody told me you were coming.' We explained the (fictional) fault. He watched for a moment, seemed satisfied that we looked legitimate, and left. We continued for another twenty minutes before exiting the building.


The New Employee

Thursday, 08:50. A third team member arrived in smart business attire — no high-vis, no tool bag, no props beyond a laptop bag and a nervous expression. The pretext was the most audacious of the three: a new employee, starting today in the compliance team.

At the second-floor reception: 'Good morning — I'm starting today in the compliance team. I was told to report to reception on the second floor and ask for [compliance team lead name]. I'm a bit early — sorry, first-day nerves.'

The receptionist smiled. First days are familiar territory for reception staff — they manage new starter arrivals regularly. She asked for the name. Our team member gave a name. She checked a list — presumably the expected new starter list provided by HR. The name was not on it.

This was the critical moment. The pretext was about to fail. What happened next demonstrates why social engineering is as much about adaptability as it is about preparation.

Our team member did not panic. 'Oh — that's odd. HR confirmed everything by email last week. [HR manager name] sent me the offer letter and said to come to the second-floor reception. Maybe it hasn't been updated yet? I know it was a bit last-minute.' A pause. A slight frown. The universal expression of someone who is worried that something has gone wrong on their first day and does not want to make a fuss.

The receptionist, faced with a polite, smartly dressed person who knew the HR manager's name and the compliance team lead's name and who had a plausible explanation for the administrative gap, made a decision. She called the compliance team. The team lead was in a meeting. She left a voicemail. She turned back to our team member: 'I can't get hold of [team lead] right now — they're in a meeting. Why don't you take a seat in the kitchen on this floor and I'll come and find you when they're free?'

Our team member was now inside the office. Unescorted. On the second floor. With access to the kitchen, the open-plan office area, the print room, and — because the internal doors on the second floor were not badge-controlled — the HR department's filing area.

The 'new employee' spent forty minutes inside the office before a member of the compliance team arrived at the kitchen, looked confused, and asked who they were. Our team member repeated the pretext. The compliance team member went to check with HR. At this point, the story was close to unravelling, and our team member disengaged — leaving the building via the ground floor before the discrepancy was resolved.

In forty minutes of unescorted access, our team member had observed and photographed unlocked filing cabinets in the HR area containing personnel folders, documents left on desks and printers, screen contents visible from the open-plan area, and a whiteboard in a meeting room listing project names and timelines marked 'Confidential'.


Three Pretexts, Three Successes

Pretext Duration Inside Areas Accessed Challenges
Fire Safety Auditor 53 minutes All floors, server room, network cabinet, executive office 0
IT Contractor 40 minutes Fourth floor, network cabinet, server corridor 1 (non-blocking — IT staff member accepted pretext)
New Employee 40 minutes Second floor, kitchen, open plan, HR filing area, print room 1 (after 40 minutes — pretext partially unravelled)

Three attempts. Three successful entries. A combined two hours and thirteen minutes of unauthorised access. Access to the server room, network cabinets, the executive floor, HR personnel files, and confidential project documentation. One partial challenge after forty minutes. Zero outright refusals.


The Attacker's Perspective

Our scope was limited to demonstrating access — we did not deploy technical attacks from our physical position. But a real adversary in the same situation would have had extensive options.

Rogue Device Deployment
A small network implant — a device the size of a USB charger — could be connected to a spare port in the network cabinet or behind a desk, providing persistent remote access to the internal network. Our fifty-three minutes of unmonitored access in the server room would have been more than sufficient.
Rogue Wireless Access Point
A wireless access point plugged into a network port and hidden behind equipment in the server room would create a persistent wireless bridge to the internal network, accessible from outside the building.
Keystroke Logger
A hardware keystroke logger inserted between a workstation's keyboard and USB port captures every keystroke — including credentials — and stores them for later retrieval or transmits them wirelessly.
Data Theft
The unlocked HR filing cabinets, the documents on printers, and the unlocked workstations represented opportunities for immediate data theft — personnel records, financial documents, client information, and strategic plans.

The Human Firewall Problem

The security industry frequently refers to employees as the 'human firewall' — the last line of defence against social engineering. This framing is well-intentioned but fundamentally flawed. It places the burden of security on individuals who are not equipped, trained, or empowered to fulfil that role effectively.

The reception staff at this organisation were not negligent. They were doing their jobs as they understood them. They were hired to welcome visitors, manage the flow of people, and provide a professional first impression. They were trained to be helpful, accommodating, and efficient. At no point in their training or their job descriptions had anyone explained how to identify a social engineering attack, how to verify a contractor's identity beyond visual inspection, or — most importantly — that it was acceptable to refuse entry to someone who appeared legitimate but could not be verified.

The IT staff member who held the server room door open for the fire safety auditor was not careless. He made a social judgement — this person looks like they belong, they have a plausible reason to be here, and refusing them entry would be awkward and confrontational. In the overwhelming majority of situations, this judgement would be correct. Social engineers succeed by operating within the margin where it is not.

Blaming individuals for social engineering failures is counterproductive. The failure is organisational — a failure to create processes, training, and culture that give people the tools and the permission to challenge.


Recommendations and Hardening

Remediation Roadmap
Phase 1 — Immediate (0–14 days) Cost: Low
✓ Implement photographic ID verification for ALL visitors
✓ Require host confirmation before ANY visitor is admitted
✓ Brief ground-floor security on contractor verification process
✓ Lock all network cabinets; restrict keys to authorised IT staff
✓ Lock HR filing cabinets; implement clean desk policy

Phase 2 — Short Term (14–90 days) Cost: Medium
○ Deploy electronic visitor management system with photo capture
○ Implement anti-tailgating awareness — badge-challenge culture
○ Train reception staff on social engineering recognition
○ Empower reception to refuse entry without escalation penalty
○ Require all contractors to be pre-registered with valid PO number
○ Implement escort policy for all non-employee visitors
○ Install anti-tailgating measures on server room door (mantrap/interlock)

Phase 3 — Strategic (90–180 days) Cost: Medium
○ Conduct social engineering awareness training for all staff
○ Establish 'challenge culture' — positive reinforcement for questioning
○ Implement duress procedures — staff know how to escalate concerns
○ Conduct regular social engineering exercises (quarterly)
○ Review contractor management process end-to-end
○ Include physical social engineering in annual pentest scope

The single most important change is cultural, not technical. The organisation must create an environment where challenging someone who cannot verify their identity is not merely permitted but actively praised. Reception staff, security guards, and general employees must understand that politely asking 'Can I see your ID?' or 'Who are you here to see? Let me call them' is a professional duty, not a social transgression.

This cultural change requires leadership reinforcement. If a receptionist refuses entry to a visitor who turns out to be legitimate, and the visitor complains, and the receptionist is reprimanded — the organisation has just trained every receptionist to never challenge anyone again. The correct response is to thank the receptionist for following the process. Challenge must be rewarded, not punished.

Contractor verification must be formalised. Every contractor visit should be pre-registered in a visitor management system, linked to a purchase order or work order, and confirmed by the internal host before the contractor is admitted. Contractors who arrive without pre-registration should be held at reception while verification is completed — regardless of how plausible their story sounds. This process must apply to all contractor types, including building management, fire safety, cleaning, and IT services.

The server room requires anti-tailgating measures. A single badge-controlled door is insufficient if any staff member can hold it open for a stranger. An interlock or mantrap — a pair of doors where the first must close before the second opens, with single-person occupancy — physically prevents tailgating regardless of social pressure.

Escort policies for visitors must be enforced without exception. No visitor — regardless of their stated purpose — should have unescorted access to any area of the office. If a host cannot accompany a visitor, the visit should be rescheduled. This applies to fire safety auditors, IT contractors, delivery personnel, and anyone else who is not a badged employee.


The Responsibility of Social Engineering Testing

Social engineering assessments differ from technical penetration tests in one critical respect: the 'vulnerabilities' being tested are people. When we report that a firewall has a misconfigured rule, nobody's feelings are hurt. When we report that a receptionist admitted an unauthorised person, there is a real risk that the individual will face disciplinary consequences.

We take this responsibility seriously. Our reports never identify individual employees by name. We describe the process failures, not the people. We explicitly recommend against disciplinary action for any staff member who was involved in the assessment. The purpose of social engineering testing is to identify systemic weaknesses in processes, training, and culture — not to catch individuals making human judgements under social pressure.

If an organisation responds to a social engineering assessment by disciplining the receptionist, they have missed the point entirely. The receptionist did not fail. The process failed. The training failed. The culture failed. Fix those, and the receptionist becomes your most effective security control.


The best firewall in the world cannot stop a polite request.

We spend millions on technical security controls. Firewalls, EDR, SIEM, encryption, segmentation, multi-factor authentication. These controls are necessary and they are effective against technical attacks. But they are irrelevant against an adversary who walks through the front door, smiles at the receptionist, and is escorted to the server room by a helpful member of the IT team.

Social engineering exploits the fundamental human desire to be helpful, to avoid confrontation, and to trust people who appear to belong. These are not flaws to be corrected — they are social instincts to be acknowledged and managed. The goal is not to make people suspicious of everyone. The goal is to give people the processes, the training, and the organisational permission to verify before they trust.

A lanyard and a clipboard got us into a server room. A polite request got us through a badge-controlled door. A sympathetic expression got us past a receptionist. None of these required a single line of code.

Until next time — stay sharp, stay curious, and if someone you do not recognise asks you to hold a door open, it is perfectly acceptable to ask them to badge in themselves.

Legal Disclaimer

This article describes a physical social engineering assessment conducted under formal engagement with full written authorisation from the client's Chief Security Officer. All identifying details have been altered or omitted to preserve client confidentiality. No individual employee is identified in this article or in the assessment report delivered to the client. Letters of authorisation were carried at all times. Unauthorised entry to premises with intent to commit an offence may constitute criminal trespass. Do not attempt to replicate these techniques without proper authorisation.



If you have not tested your physical security with social engineering, the answer might surprise you.

Hedgehog Security conducts physical social engineering assessments that test the human layer of your security programme — the processes, training, and culture that determine whether an adversary can walk through your front door. We test with respect for your people, report without naming individuals, and deliver actionable recommendations that strengthen your organisation without blaming your staff.