Attack the Key Own the Lock

Slides:



Advertisements
Similar presentations
Working with PowerPoint
Advertisements

How to Use This Template Copy the presentation to your hard drive. Open the slides using slide sorter and copy slides #3, 4 and 5 for each question you.
CanPRO Compact from Nemco The only commercial can opener in the world that opens cans from the side leaving smooth edges on the lid!
Copyright by Silca S.p.A Duo Plus Your first Silca Machine! Enter the world of high quality Locksmithing.
Kwikset Rekey Ultramax Rekeying the Ultramax by Kwikset this presentation is designed for beginners.
COPYRIGHT SILCA SpA 2005 Silca is a member of the Kaba Group.
COPYRIGHT SILCA SpA 2006 LeonardoSilca S.p.A. Leonardo.
Section 2.2 – Locks and Keys Digital security often begins with physical security… 1.
VS Series Shears. User-friendly CNC Touchscreen Control Flexibility for Thick/Thin or Narrow/Wide Sheets Automatic Swing-up Back Gauge T-slotted Sheet.
Lecture 5 – Getting Physical Security Computer Science Tripos part 2 Ross Anderson.
Interface / navigation COM 366 Web Design & Production.
Disability and computers BY CHRIS PEMBLE. Blindness  Being blind is very tough have you ever closed your eyes and tried to go around your room or your.
+ So you want to make a scientific poster? A best practices guide by Brooklyn ITF Jennifer Corby.
HAND DRILLS/TWIST DRILLS/EXTRACTORS. DRILLS n USED TO TURN DRILL BITS AND OTHER OBJECTS n CAN BE VARIABLE SPEED (VS) –THE FARTHER YOU PULL THE TRIGGER.
Sections 2.1 Physical Protection and Attacks 2.2 – Locks and Keys Digital security often begins with physical security… 1.
LAB TOOLS Identification and Function. POUNDING TOOLS HAMMERS- TO USE TO STRIKE AN OBJECT AND WILL LEAVE SURFACE MARRING AND DENTS ON THE OBJECT HAMMERS-
Keys and Key Systems David M. Koenig, CPP. Today’s Topics Common Keys Key System Components Master Keying High Security Key Systems.
2006 Hand and Power Tool Safety Basic Rules for Rube Goldberg Competition,
The new version of real player provides you some new features those are not in the old versions which are very useful to most people..
Coterm Real-time terminal collaboration Like Google Docs for the Shell Matthew R. Laue
Decoding the Kwikset SmartKey™ Shmoocon 2009 Shane Lawson
Advanced Scroll Ring. Designing the ring Decide on your pattern. You can do one from the previous slide, or you can come up with your own design. Determine.
1 Basic Hand tools Basic Tools. 2 3 Objectives Upon completion of this class and activities, you will be able to: –Recognize basic hand tools. –Identify.
PKCS11 Key Protection And the Insider Threat.
FFA CAREER DEVELOPMENT EVENT Part 4
COPYRIGHT SILCA SpA 2007 RekordSilca S.p.A.. COPYRIGHT SILCA SpA 2007 RekordSilca S.p.A. REKORD Rekord is the new Silca key cutting machine for cylinder.
Microsoft ® Virtual Academy Module 3 Understanding Security Policies Christopher Chapman | Content PM, Microsoft Thomas Willingham | Content Developer,
Proper Use of Agricultural Mechanics Power Tools
Modeling Process - Shoe mold - 08 OCT 2004 Inustechnology,Inc.
FS2600 August News/Announcements Defcon Site fail Contact info.
Master Keying David M. Koenig, CPP. Master Keying Is... n System Of Organizing Numbers –For Cutting Keys –For Pinning Locks n Grouping Of Locks And Keys.
UNOCODE 299 Copyright Silca S.p.A UNOCODE 299.
Hi, Learning Skills Students! This is Slide 1 of your Power Point Instruction for this class. After reading each slide, make sure you: 1.Follow the instructions.
New utility patented locking system Patent expires 2027 Sales Presentation.
Chapter 2 Section 3 Using Scientific Measurements Graphs & Tables: Key Features and Reading.
Close Coupled Bullieds
Draw Tools and Object. Array tool The product have repetitive feature.You don’t need to draw one by one. Use array tool is easy to finish these features.
Oops, I’m sorry honey. I don’t have the keys. Well, at least this marriage is off to a good start! Next up: KinkyHades - Handcuffs.
Assembly Modeling Constraints ENGR 1182 SolidWorks 05.
MATRIX series.
Attack the Key Own the Lock
Attack the Key Own the Lock by datagram & Schuyler Towne Defcon 18 (2010)‏ Las Vegas, NV.
Proposed Symbol for Central Information commission A PRESENTATION OF RATIONALE Please click for next slide.
Olympic.
Ideal Mechanical Advantage Review. #1: If you exert an input force of 40 N on a machine and the machine produces an output force of 20 N, what is the.
MS Series Shears. D-Touch 7 Touchscreen Control (10 ga.) 40” Squaring Arm with T-Slotted and Disappearing Stop Two 40” Front Arm Supports 17” Rear Operated.
Locksport An Emerging Subculture By Schuyler Towne DEFCON 15 Aug
2 pt 3 pt 4 pt 5pt 1 pt 2 pt 3 pt 4 pt 5 pt 1 pt 2pt 3 pt 4pt 5 pt 1pt 2pt 3 pt 4 pt 5 pt 1 pt 2 pt 3 pt 4pt 5 pt 1pt Menus Give Me an Example Edits Make.
Holy Cross Photography Photo Olympics Assignment Please choose 3 Assignments to complete. (Photo Triathalon???)
Copyright Silca S.p.A REKORD Copyright Silca S.p.A REKORD 2000 Results of major research which involved every single component, Rekord.
Feature Menu Introducing the Selection Informational Text Focus: Technical Directions Reading Skills Focus: Understanding Graphics Writing Skills Focus.
MIRACLE WORKERZ TRAINING COURSE Introduction to Hand tools.
Create an Engineering Drawing Move the frame file (*.FRM) and all the part files (*.PRT) into one folder File -> Set working directory -> select the holder.
Understanding Security Policies Lesson 3. Objectives.
10 things you can do today to reduce your security risk.
Model a………………. W Coping saw Model a………………. M, P, W Junior hack saw Model a……………… W Tenon saw Model a………………. W, P, M File Model a………………. M, P, W Hack saw.
How To Make Friends & Influence Lock Manufacturers Schuyler Towne & Jon King DEFCON 16, 2008 Reviewing this on the DEFCON 16 DVD? Be sure to check ndemag.com/DC16.
The Lock Talk at Secure State Schuyler Towne. Parts of the Lock HOUSING KEYWAY PLUG.
Aircraft Hardware , Materials, System processes
KEY FEATURES Beautifully chiseled metallic body
Small Button Template Finished button size (dotted line): 1.25 inch (1 1/4 inch) Outer circle size (cut line): inch (1 5/8 inch) The dotted line.
Combination pliers.
The Lock Talk at Princeton
Property Security: Locks 101 Small format Interchangeable core
People, Like Paper, Can Change
People, Like Paper, Can Change
Sewing Equipment.
Title Goes Here Presenter Name Here Title Goes Here Presenter Name Here.
Tools and their uses. scriber Depth rule Combination caliper.
Hand and Power Tools This presentation will explore:
Presentation transcript:

Attack the Key Own the Lock by datagram & Schuyler Towne Defcon 18 (2010)‏ Las Vegas, NV

About Us datagram Schuyler TOOOL US NDE Magazine Wheel of Fortune

How Locks Work

How Locks Work

How Locks Work

How Locks Work

Key Control Availability of blanks Distribution Duplication/simulation

Attacking the Key Bitting depths/code Keyway Model of the lock Additional security features

Physical Access to Keys Holy Grail Duration = Attack Quality Wrist Impressioning

Copy Impressioning Photo of those mold shits

Direct Measurement Key gauges Micrometer, calipers, etc photo of key getting measured photo of fancy measurement mafs?

Visual Access to Key Sight reading Estimation Photography

Visual Access – UCSD

Visual Access - Diebold

Visual Access – NY MTA

Key Blanks Impressioning Overlifting “Reflecting” keys Sectional keyways Rake keys Key bumping

Impressioning

Impressioning Works Forever!

Overlifting

Overlifting

Reflecting Keys

Sectional Keyways

Sectional Keyways

Universal Handcuff Keys

Rake/Gypsy Keys I'm betting this is the same as Gypsy keys? They basically cut keys like this: And then use them to rake the lock open

Incorrect Key Master key decoding Bumping Skeleton keys Sidebar attacks Passive component bypasses Decoding attacks

Master Key Systems

Master Key Systems

Master Key Systems

Master Key Systems

Master Key Systems

Key Bumping Basic physics Specialized key Easy, effective Vendor response

Pick Gun Mechanics

How Bumping Works

Creating Bump Keys Any key that fits Cut “999” key (deepest pin depths)‏ Use key gauges Cut with Hand file, dremel, key cutter

Bump Keys

Key Bumping

Key Bumping

100% Efficiency...?

Don't underestimate attackers...

Bumping Hammers

Side Pins

Side Pins

Side Pins

Side Pins

Side Pins

Regional Sidebar Attacks ASSA Twin Combi Schlage Primus Fichet 480 The list goes on... Schlage is doing it wrong.

One Last Way Schlage Is Doing It Wrong: LFIC BEST SFIC Small Format Interchangable Core Schlage LFIC 6.5 Control Key

Passive Components

Resources openlocksport.com lockwiki.com lockpickingforensics.com ndemag.com

Meet us at Q&A!