Presentation is loading. Please wait.

Presentation is loading. Please wait.

Attack the Key Own the Lock by datagram & Schuyler Towne Defcon 18 (2010)‏ Las Vegas, NV.

Similar presentations


Presentation on theme: "Attack the Key Own the Lock by datagram & Schuyler Towne Defcon 18 (2010)‏ Las Vegas, NV."— Presentation transcript:

1 Attack the Key Own the Lock by datagram & Schuyler Towne Defcon 18 (2010)‏ Las Vegas, NV

2 About Us Datagram – Forensic locksmith – Douchebag – No game shows :( Schuyler – TOOOL US – NDE Magazine – Wheel of Fortune

3 How Locks Work

4

5

6

7 Key Control Availability of blanks Distribution Duplication/simulation

8 Attacking the Key Bitting depths/code Keyway Model of the lock Additional security features

9 Physical Access to Keys Holy Grail Duration = Attack Quality Wrist Impressioning

10 Direct Measurement Key gauges Micrometer Calipers

11 Copy Impressioning

12

13

14 Visual Access to Key Sight reading Estimation Photography

15 Visual Access – UCSD

16 Visual Access - UCSD

17 Visual Access - Diebold

18 Visual Access – NY MTA

19 Key Blanks Impressioning Overlifting “Reflecting” keys Sectional keyways Rake keys Key bumping

20 Universal Handcuff Keys

21 Overlifting

22

23 Rake/Gypsy Keys

24 Impressioning

25 Works Forever!

26 Reflecting Keys

27

28

29

30 Sectional Keyways

31

32 Incorrect Key Master key decoding Bumping Skeleton keys Sidebar attacks Passive component bypasses Decoding attacks

33 Master Key Systems

34

35

36

37

38 Key Bumping Basic physics Specialized key Easy, effective Vendor response

39 How Bumping Works

40 Creating Bump Keys Any key that fits Cut “999” key (deepest pin depths)‏  Use key gauges Cut with  Hand file, dremel, key cutter

41 Bump Keys

42 Key Bumping

43

44 100% Efficiency...?

45 Don't underestimate attackers...

46 Bumping Hammers

47 Side Pins

48

49

50

51

52 Regional Sidebar Attacks ASSA Twin Combi Schlage Primus Fichet 480 The list goes on... Schlage is doing it wrong.

53

54

55

56

57 One Last Way Schlage Is Doing It Wrong: LFIC BEST SFIC Small Format Interchangable Core Schlage LFIC 6.5 Control Key

58 Passive Components

59 What have we learned?

60 Resources openlocksport.com lockwiki.com lockpickingforensics.com ndemag.com KICKSTARTER

61 Meet us at Q&A!


Download ppt "Attack the Key Own the Lock by datagram & Schuyler Towne Defcon 18 (2010)‏ Las Vegas, NV."

Similar presentations


Ads by Google