1 / 61

Attack the Key Own the Lock

by datagram & Schuyler Towne Defcon 18 (2010) ‏ Las Vegas, NV. Attack the Key Own the Lock. Schuyler TOOOL US NDE Magazine Wheel of Fortune. About Us. Datagram Forensic locksmith Douchebag No game shows :(. How Locks Work. How Locks Work. How Locks Work. How Locks Work.

cburroughs
Télécharger la présentation

Attack the Key Own the Lock

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. by datagram & Schuyler Towne Defcon 18 (2010)‏ Las Vegas, NV Attack the KeyOwn the Lock

  2. Schuyler TOOOL US NDE Magazine Wheel of Fortune About Us • Datagram • Forensic locksmith • Douchebag • No game shows :(

  3. How Locks Work

  4. How Locks Work

  5. How Locks Work

  6. How Locks Work

  7. Key Control • Availability of blanks • Distribution • Duplication/simulation

  8. Attacking the Key • Bitting depths/code • Keyway • Model of the lock • Additional security features

  9. Physical Access to Keys • Holy Grail • Duration = Attack Quality • Wrist Impressioning

  10. Direct Measurement • Key gauges • Micrometer • Calipers

  11. Copy Impressioning

  12. Copy Impressioning

  13. Copy Impressioning

  14. Visual Access to Key • Sight reading • Estimation • Photography

  15. Visual Access – UCSD

  16. Visual Access - UCSD

  17. Visual Access - Diebold

  18. Visual Access – NY MTA

  19. Key Blanks • Impressioning • Overlifting • “Reflecting” keys • Sectional keyways • Rake keys • Key bumping

  20. Universal Handcuff Keys

  21. Overlifting

  22. Overlifting

  23. Rake/Gypsy Keys

  24. Impressioning

  25. Impressioning Works Forever!

  26. Reflecting Keys

  27. Sectional Keyways

  28. Sectional Keyways

  29. Incorrect Key • Master key decoding • Bumping • Skeleton keys • Sidebar attacks • Passive component bypasses • Decoding attacks

  30. Master Key Systems

  31. Master Key Systems

  32. Master Key Systems

  33. Master Key Systems

  34. Master Key Systems

  35. Key Bumping • Basic physics • Specialized key • Easy, effective • Vendor response

  36. How Bumping Works

  37. Creating Bump Keys • Any key that fits • Cut “999” key (deepest pin depths)‏ • Use key gauges • Cut with • Hand file, dremel, key cutter

  38. Bump Keys

  39. Key Bumping

  40. Key Bumping

  41. 100% Efficiency...?

  42. Don't underestimate attackers...

  43. Bumping Hammers

  44. Side Pins

  45. Side Pins

  46. Side Pins

  47. Side Pins

More Related