the search for the perfect door - deviant ollam

201
Physical Security: Ideal Doors & Padlocks Deviant Ollam ShakaCon 2016/07/13

Upload: shakacon

Post on 26-Jan-2017

202 views

Category:

Devices & Hardware


21 download

TRANSCRIPT

Page 1: The Search for the Perfect Door - Deviant Ollam

Physical Security Ideal Doors amp Padlocks

Deviant OllamShakaCon ndash 20160713

Who Am I

httpenterthecorenet

Security Consultant By Day

httpenterthecorenet

Criminal Consultant By Night

httpenterthecorenet

Basicallyhellip Irsquom Professionally Dangerous

Why Does Physical Security Matter

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

From the onset KWC was adamant that no evidence of

unauthorized access had been uncovered It became clear

that KWC management was aware of potential unauthorized

access into the OT systems of the water district

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

From the onset KWC was adamant that no evidence of

unauthorized access had been uncovered It became clear

that KWC management was aware of potential unauthorized

access into the OT systems of the water district

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

Access to customer water usage PII and payment data required only a username and password

No second authentication factor was needed Next we found a direct cable connection between

the application and the AS400 system Making matters worse the AS400 system had open access

to the internet and its internal IP address and administrative credentials were found on the

payment application webserver in clear text within an initialization file

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

But with a Physical Breachhellip

httpenterthecorenet

All of your firewall ruleshellip

httpenterthecorenet

All of your firewall ruleshellip can be compromised

httpenterthecorenet

All your hard work herehellip

httpenterthecorenet

All your hard work herehellip gets undermined here

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 2: The Search for the Perfect Door - Deviant Ollam

Who Am I

httpenterthecorenet

Security Consultant By Day

httpenterthecorenet

Criminal Consultant By Night

httpenterthecorenet

Basicallyhellip Irsquom Professionally Dangerous

Why Does Physical Security Matter

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

From the onset KWC was adamant that no evidence of

unauthorized access had been uncovered It became clear

that KWC management was aware of potential unauthorized

access into the OT systems of the water district

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

From the onset KWC was adamant that no evidence of

unauthorized access had been uncovered It became clear

that KWC management was aware of potential unauthorized

access into the OT systems of the water district

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

Access to customer water usage PII and payment data required only a username and password

No second authentication factor was needed Next we found a direct cable connection between

the application and the AS400 system Making matters worse the AS400 system had open access

to the internet and its internal IP address and administrative credentials were found on the

payment application webserver in clear text within an initialization file

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

But with a Physical Breachhellip

httpenterthecorenet

All of your firewall ruleshellip

httpenterthecorenet

All of your firewall ruleshellip can be compromised

httpenterthecorenet

All your hard work herehellip

httpenterthecorenet

All your hard work herehellip gets undermined here

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 3: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Security Consultant By Day

httpenterthecorenet

Criminal Consultant By Night

httpenterthecorenet

Basicallyhellip Irsquom Professionally Dangerous

Why Does Physical Security Matter

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

From the onset KWC was adamant that no evidence of

unauthorized access had been uncovered It became clear

that KWC management was aware of potential unauthorized

access into the OT systems of the water district

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

From the onset KWC was adamant that no evidence of

unauthorized access had been uncovered It became clear

that KWC management was aware of potential unauthorized

access into the OT systems of the water district

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

Access to customer water usage PII and payment data required only a username and password

No second authentication factor was needed Next we found a direct cable connection between

the application and the AS400 system Making matters worse the AS400 system had open access

to the internet and its internal IP address and administrative credentials were found on the

payment application webserver in clear text within an initialization file

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

But with a Physical Breachhellip

httpenterthecorenet

All of your firewall ruleshellip

httpenterthecorenet

All of your firewall ruleshellip can be compromised

httpenterthecorenet

All your hard work herehellip

httpenterthecorenet

All your hard work herehellip gets undermined here

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 4: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Criminal Consultant By Night

httpenterthecorenet

Basicallyhellip Irsquom Professionally Dangerous

Why Does Physical Security Matter

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

From the onset KWC was adamant that no evidence of

unauthorized access had been uncovered It became clear

that KWC management was aware of potential unauthorized

access into the OT systems of the water district

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

From the onset KWC was adamant that no evidence of

unauthorized access had been uncovered It became clear

that KWC management was aware of potential unauthorized

access into the OT systems of the water district

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

Access to customer water usage PII and payment data required only a username and password

No second authentication factor was needed Next we found a direct cable connection between

the application and the AS400 system Making matters worse the AS400 system had open access

to the internet and its internal IP address and administrative credentials were found on the

payment application webserver in clear text within an initialization file

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

But with a Physical Breachhellip

httpenterthecorenet

All of your firewall ruleshellip

httpenterthecorenet

All of your firewall ruleshellip can be compromised

httpenterthecorenet

All your hard work herehellip

httpenterthecorenet

All your hard work herehellip gets undermined here

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 5: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Basicallyhellip Irsquom Professionally Dangerous

Why Does Physical Security Matter

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

From the onset KWC was adamant that no evidence of

unauthorized access had been uncovered It became clear

that KWC management was aware of potential unauthorized

access into the OT systems of the water district

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

From the onset KWC was adamant that no evidence of

unauthorized access had been uncovered It became clear

that KWC management was aware of potential unauthorized

access into the OT systems of the water district

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

Access to customer water usage PII and payment data required only a username and password

No second authentication factor was needed Next we found a direct cable connection between

the application and the AS400 system Making matters worse the AS400 system had open access

to the internet and its internal IP address and administrative credentials were found on the

payment application webserver in clear text within an initialization file

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

But with a Physical Breachhellip

httpenterthecorenet

All of your firewall ruleshellip

httpenterthecorenet

All of your firewall ruleshellip can be compromised

httpenterthecorenet

All your hard work herehellip

httpenterthecorenet

All your hard work herehellip gets undermined here

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 6: The Search for the Perfect Door - Deviant Ollam

Why Does Physical Security Matter

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

From the onset KWC was adamant that no evidence of

unauthorized access had been uncovered It became clear

that KWC management was aware of potential unauthorized

access into the OT systems of the water district

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

From the onset KWC was adamant that no evidence of

unauthorized access had been uncovered It became clear

that KWC management was aware of potential unauthorized

access into the OT systems of the water district

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

Access to customer water usage PII and payment data required only a username and password

No second authentication factor was needed Next we found a direct cable connection between

the application and the AS400 system Making matters worse the AS400 system had open access

to the internet and its internal IP address and administrative credentials were found on the

payment application webserver in clear text within an initialization file

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

But with a Physical Breachhellip

httpenterthecorenet

All of your firewall ruleshellip

httpenterthecorenet

All of your firewall ruleshellip can be compromised

httpenterthecorenet

All your hard work herehellip

httpenterthecorenet

All your hard work herehellip gets undermined here

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 7: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

From the onset KWC was adamant that no evidence of

unauthorized access had been uncovered It became clear

that KWC management was aware of potential unauthorized

access into the OT systems of the water district

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

From the onset KWC was adamant that no evidence of

unauthorized access had been uncovered It became clear

that KWC management was aware of potential unauthorized

access into the OT systems of the water district

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

Access to customer water usage PII and payment data required only a username and password

No second authentication factor was needed Next we found a direct cable connection between

the application and the AS400 system Making matters worse the AS400 system had open access

to the internet and its internal IP address and administrative credentials were found on the

payment application webserver in clear text within an initialization file

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

But with a Physical Breachhellip

httpenterthecorenet

All of your firewall ruleshellip

httpenterthecorenet

All of your firewall ruleshellip can be compromised

httpenterthecorenet

All your hard work herehellip

httpenterthecorenet

All your hard work herehellip gets undermined here

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 8: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

From the onset KWC was adamant that no evidence of

unauthorized access had been uncovered It became clear

that KWC management was aware of potential unauthorized

access into the OT systems of the water district

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

From the onset KWC was adamant that no evidence of

unauthorized access had been uncovered It became clear

that KWC management was aware of potential unauthorized

access into the OT systems of the water district

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

Access to customer water usage PII and payment data required only a username and password

No second authentication factor was needed Next we found a direct cable connection between

the application and the AS400 system Making matters worse the AS400 system had open access

to the internet and its internal IP address and administrative credentials were found on the

payment application webserver in clear text within an initialization file

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

But with a Physical Breachhellip

httpenterthecorenet

All of your firewall ruleshellip

httpenterthecorenet

All of your firewall ruleshellip can be compromised

httpenterthecorenet

All your hard work herehellip

httpenterthecorenet

All your hard work herehellip gets undermined here

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 9: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

From the onset KWC was adamant that no evidence of

unauthorized access had been uncovered It became clear

that KWC management was aware of potential unauthorized

access into the OT systems of the water district

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

Access to customer water usage PII and payment data required only a username and password

No second authentication factor was needed Next we found a direct cable connection between

the application and the AS400 system Making matters worse the AS400 system had open access

to the internet and its internal IP address and administrative credentials were found on the

payment application webserver in clear text within an initialization file

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

But with a Physical Breachhellip

httpenterthecorenet

All of your firewall ruleshellip

httpenterthecorenet

All of your firewall ruleshellip can be compromised

httpenterthecorenet

All your hard work herehellip

httpenterthecorenet

All your hard work herehellip gets undermined here

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 10: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

Access to customer water usage PII and payment data required only a username and password

No second authentication factor was needed Next we found a direct cable connection between

the application and the AS400 system Making matters worse the AS400 system had open access

to the internet and its internal IP address and administrative credentials were found on the

payment application webserver in clear text within an initialization file

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

But with a Physical Breachhellip

httpenterthecorenet

All of your firewall ruleshellip

httpenterthecorenet

All of your firewall ruleshellip can be compromised

httpenterthecorenet

All your hard work herehellip

httpenterthecorenet

All your hard work herehellip gets undermined here

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 11: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

But with a Physical Breachhellip

httpenterthecorenet

All of your firewall ruleshellip

httpenterthecorenet

All of your firewall ruleshellip can be compromised

httpenterthecorenet

All your hard work herehellip

httpenterthecorenet

All your hard work herehellip gets undermined here

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 12: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

But with a Physical Breachhellip

httpenterthecorenet

All of your firewall ruleshellip

httpenterthecorenet

All of your firewall ruleshellip can be compromised

httpenterthecorenet

All your hard work herehellip

httpenterthecorenet

All your hard work herehellip gets undermined here

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 13: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

But with a Physical Breachhellip

httpenterthecorenet

All of your firewall ruleshellip

httpenterthecorenet

All of your firewall ruleshellip can be compromised

httpenterthecorenet

All your hard work herehellip

httpenterthecorenet

All your hard work herehellip gets undermined here

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 14: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

All of your firewall ruleshellip

httpenterthecorenet

All of your firewall ruleshellip can be compromised

httpenterthecorenet

All your hard work herehellip

httpenterthecorenet

All your hard work herehellip gets undermined here

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 15: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

All of your firewall ruleshellip can be compromised

httpenterthecorenet

All your hard work herehellip

httpenterthecorenet

All your hard work herehellip gets undermined here

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 16: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

All your hard work herehellip

httpenterthecorenet

All your hard work herehellip gets undermined here

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 17: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

All your hard work herehellip gets undermined here

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 18: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 19: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 20: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 21: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 22: The Search for the Perfect Door - Deviant Ollam

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 23: The Search for the Perfect Door - Deviant Ollam

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 24: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 25: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 26: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 27: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 28: The Search for the Perfect Door - Deviant Ollam

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 29: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 30: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 31: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 32: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 33: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 34: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 35: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 36: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 37: The Search for the Perfect Door - Deviant Ollam

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 38: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 39: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 40: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 41: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 42: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 43: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 44: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 45: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 46: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 47: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 48: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 49: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 50: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 51: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 52: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 53: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 54: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 55: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 56: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 57: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 58: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 59: The Search for the Perfect Door - Deviant Ollam

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 60: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 61: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 62: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 63: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 64: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 65: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 66: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 67: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 68: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 69: The Search for the Perfect Door - Deviant Ollam

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 70: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 71: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 72: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 73: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 74: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 75: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 76: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 77: The Search for the Perfect Door - Deviant Ollam

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 78: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 79: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 80: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 81: The Search for the Perfect Door - Deviant Ollam

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 82: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 83: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 84: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 85: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 86: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 87: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 88: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 89: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 90: The Search for the Perfect Door - Deviant Ollam

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 91: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 92: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 93: The Search for the Perfect Door - Deviant Ollam

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 94: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 95: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 96: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 97: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 98: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 99: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 100: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 101: The Search for the Perfect Door - Deviant Ollam

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 102: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 103: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 104: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 105: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 106: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 107: The Search for the Perfect Door - Deviant Ollam

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 108: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 109: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 110: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 111: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 112: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 113: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 114: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 115: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 116: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 117: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 118: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 119: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 120: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 121: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 122: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 123: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 124: The Search for the Perfect Door - Deviant Ollam

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 125: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 126: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 127: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 128: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 129: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 130: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 131: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 132: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 133: The Search for the Perfect Door - Deviant Ollam

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 134: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 135: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 136: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 137: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 138: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 139: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 140: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 141: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 142: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 143: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 144: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 145: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 146: The Search for the Perfect Door - Deviant Ollam

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 147: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 148: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 149: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 150: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 151: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 152: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 153: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 154: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 155: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 156: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 157: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 158: The Search for the Perfect Door - Deviant Ollam

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 159: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 160: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 161: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 162: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 163: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 164: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 165: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 166: The Search for the Perfect Door - Deviant Ollam

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 167: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 168: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 169: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 170: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 171: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 172: The Search for the Perfect Door - Deviant Ollam

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 173: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 174: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 175: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 176: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 177: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 178: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 179: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 180: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 181: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 182: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 183: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 184: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 185: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 186: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 187: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 188: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 189: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 190: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 191: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 192: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 193: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 194: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 195: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 196: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 197: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 198: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 199: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 200: The Search for the Perfect Door - Deviant Ollam

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much
Page 201: The Search for the Perfect Door - Deviant Ollam

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much