Download presentation
Presentation is loading. Please wait.
Published byMark Kennedy Modified over 9 years ago
1
Attack the Key Own the Lock by datagram & Schuyler Towne Defcon 18 (2010) Las Vegas, NV
2
About Us Datagram – Forensic locksmith – Douchebag – No game shows :( Schuyler – TOOOL US – NDE Magazine – Wheel of Fortune
3
How Locks Work
7
Key Control Availability of blanks Distribution Duplication/simulation
8
Attacking the Key Bitting depths/code Keyway Model of the lock Additional security features
9
Physical Access to Keys Holy Grail Duration = Attack Quality Wrist Impressioning
10
Direct Measurement Key gauges Micrometer Calipers
11
Copy Impressioning
14
Visual Access to Key Sight reading Estimation Photography
15
Visual Access – UCSD
16
Visual Access - UCSD
17
Visual Access - Diebold
18
Visual Access – NY MTA
19
Key Blanks Impressioning Overlifting “Reflecting” keys Sectional keyways Rake keys Key bumping
20
Universal Handcuff Keys
21
Overlifting
23
Rake/Gypsy Keys
24
Impressioning
25
Works Forever!
26
Reflecting Keys
30
Sectional Keyways
32
Incorrect Key Master key decoding Bumping Skeleton keys Sidebar attacks Passive component bypasses Decoding attacks
33
Master Key Systems
38
Key Bumping Basic physics Specialized key Easy, effective Vendor response
39
How Bumping Works
40
Creating Bump Keys Any key that fits Cut “999” key (deepest pin depths) Use key gauges Cut with Hand file, dremel, key cutter
41
Bump Keys
42
Key Bumping
44
100% Efficiency...?
45
Don't underestimate attackers...
46
Bumping Hammers
47
Side Pins
52
Regional Sidebar Attacks ASSA Twin Combi Schlage Primus Fichet 480 The list goes on... Schlage is doing it wrong.
57
One Last Way Schlage Is Doing It Wrong: LFIC BEST SFIC Small Format Interchangable Core Schlage LFIC 6.5 Control Key
58
Passive Components
59
What have we learned?
60
Resources openlocksport.com lockwiki.com lockpickingforensics.com ndemag.com KICKSTARTER
61
Meet us at Q&A!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.