attack the key own the lock

51
Attack the Key Own the Lock by datagram & Schuyler Towne Defcon 18 (2010) Las Vegas, NV

Upload: duard

Post on 12-Jan-2016

30 views

Category:

Documents


1 download

DESCRIPTION

by datagram & Schuyler Towne Defcon 18 (2010)‏ Las Vegas, NV. Attack the Key Own the Lock. Schuyler TOOOL US NDE Magazine Wheel of Fortune. About Us. datagram. How Locks Work. How Locks Work. How Locks Work. How Locks Work. Key Control. Availability of blanks Distribution - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Attack the Key Own the Lock

Attack the KeyOwn the Lock

by datagram & Schuyler Towne

Defcon 18 (2010)Las Vegas, NV

Page 2: Attack the Key Own the Lock

About Us

datagram Schuyler TOOOL US NDE Magazine Wheel of Fortune

Page 3: Attack the Key Own the Lock

How Locks Work

Page 4: Attack the Key Own the Lock

How Locks Work

Page 5: Attack the Key Own the Lock

How Locks Work

Page 6: Attack the Key Own the Lock

How Locks Work

Page 7: Attack the Key Own the Lock

Key Control

Availability of blanks Distribution Duplication/simulation

Page 8: Attack the Key Own the Lock

Attacking the Key

Bitting depths/code Keyway Model of the lock

Additional security features

Page 9: Attack the Key Own the Lock

Physical Access to Keys

Holy Grail Duration = Attack Quality Wrist Impressioning

Page 10: Attack the Key Own the Lock

Copy Impressioning

Photo of those mold shits

Page 11: Attack the Key Own the Lock

Direct Measurement

Key gauges Micrometer, calipers, etc

photo of key getting measuredphoto of fancy measurement mafs?

Page 12: Attack the Key Own the Lock

Visual Access to Key

Sight reading Estimation Photography

Page 13: Attack the Key Own the Lock

Visual Access – UCSD

Page 14: Attack the Key Own the Lock

Visual Access - Diebold

Page 15: Attack the Key Own the Lock

Visual Access – NY MTA

Page 16: Attack the Key Own the Lock

Key Blanks

Impressioning Overlifting “Reflecting” keys Sectional keyways Rake keys Key bumping

Page 17: Attack the Key Own the Lock

Impressioning

Page 18: Attack the Key Own the Lock

Impressioning

Works Forever!

Page 19: Attack the Key Own the Lock

Overlifting

Page 20: Attack the Key Own the Lock

Overlifting

Page 21: Attack the Key Own the Lock

Reflecting Keys

Page 22: Attack the Key Own the Lock

Sectional Keyways

Page 23: Attack the Key Own the Lock

Sectional Keyways

Page 24: Attack the Key Own the Lock

Universal Handcuff Keys

Page 25: Attack the Key Own the Lock

Rake/Gypsy Keys

I'm betting this is the same as Gypsy keys? They basically cut keys like this:

And then use them to rake the lock open

Page 26: Attack the Key Own the Lock

Incorrect Key

Master key decoding Bumping Skeleton keys Sidebar attacks Passive component bypasses Decoding attacks

Page 27: Attack the Key Own the Lock

Master Key Systems

Page 28: Attack the Key Own the Lock

Master Key Systems

Page 29: Attack the Key Own the Lock

Master Key Systems

Page 30: Attack the Key Own the Lock

Master Key Systems

Page 31: Attack the Key Own the Lock

Master Key Systems

Page 32: Attack the Key Own the Lock

Key Bumping

Basic physics

Specialized key

Easy, effective

Vendor response

Page 33: Attack the Key Own the Lock

Pick Gun Mechanics

Page 34: Attack the Key Own the Lock

How Bumping Works

Page 35: Attack the Key Own the Lock

Creating Bump Keys

Any key that fits Cut “999” key (deepest pin depths)

Use key gauges

Cut with Hand file, dremel, key cutter

Page 36: Attack the Key Own the Lock

Bump Keys

Page 37: Attack the Key Own the Lock

Key Bumping

Page 38: Attack the Key Own the Lock

Key Bumping

Page 39: Attack the Key Own the Lock

100% Efficiency...?

Page 40: Attack the Key Own the Lock

Don't underestimate

attackers...

Page 41: Attack the Key Own the Lock

Bumping Hammers

Page 42: Attack the Key Own the Lock

Side Pins

Page 43: Attack the Key Own the Lock

Side Pins

Page 44: Attack the Key Own the Lock

Side Pins

Page 45: Attack the Key Own the Lock

Side Pins

Page 46: Attack the Key Own the Lock

Side Pins

Page 47: Attack the Key Own the Lock

Regional Sidebar Attacks

ASSA Twin Combi Schlage Primus Fichet 480 The list goes on...

Schlage is doing it wrong.

Page 48: Attack the Key Own the Lock

One Last Way Schlage Is Doing It Wrong: LFIC

BEST SFIC Small Format

Interchangable Core

Schlage LFIC 6.5 Control Key

Page 49: Attack the Key Own the Lock

Passive Components

Page 50: Attack the Key Own the Lock

Resources

openlocksport.com lockwiki.com lockpickingforensics.com ndemag.com

Page 51: Attack the Key Own the Lock

Meet us at Q&A!