61
Attack the Key Own the Lock by datagram & Schuyler Towne Defcon 18 (2010) Las Vegas, NV

Attack the Key Own the Lock

Embed Size (px)

DESCRIPTION

by datagram & Schuyler Towne Defcon 18 (2010) ‏ Las Vegas, NV. Attack the Key Own the Lock. Schuyler TOOOL US NDE Magazine Wheel of Fortune. About Us. Datagram Forensic locksmith Douchebag No game shows :(. How Locks Work. How Locks Work. How Locks Work. How Locks Work. - PowerPoint PPT Presentation

Citation preview

Page 1: Attack the Key Own the Lock

Attack the KeyOwn the Lock

by datagram & Schuyler Towne

Defcon 18 (2010)Las Vegas, NV

Page 2: Attack the Key Own the Lock

About Us

Datagram– Forensic locksmith– Douchebag– No game shows :(

Schuyler– TOOOL US– NDE Magazine– Wheel of Fortune

Page 3: Attack the Key Own the Lock

How Locks Work

Page 4: Attack the Key Own the Lock

How Locks Work

Page 5: Attack the Key Own the Lock

How Locks Work

Page 6: Attack the Key Own the Lock

How Locks Work

Page 7: Attack the Key Own the Lock

Key Control

Availability of blanks Distribution Duplication/simulation

Page 8: Attack the Key Own the Lock

Attacking the Key

Bitting depths/code Keyway Model of the lock

Additional security features

Page 9: Attack the Key Own the Lock

Physical Access to Keys

Holy Grail Duration = Attack Quality Wrist Impressioning

Page 10: Attack the Key Own the Lock

Direct Measurement

Key gauges Micrometer Calipers

Page 11: Attack the Key Own the Lock

Copy Impressioning

Page 12: Attack the Key Own the Lock

Copy Impressioning

Page 13: Attack the Key Own the Lock

Copy Impressioning

Page 14: Attack the Key Own the Lock

Visual Access to Key

Sight reading Estimation Photography

Page 15: Attack the Key Own the Lock

Visual Access – UCSD

Page 16: Attack the Key Own the Lock

Visual Access - UCSD

Page 17: Attack the Key Own the Lock

Visual Access - Diebold

Page 18: Attack the Key Own the Lock

Visual Access – NY MTA

Page 19: Attack the Key Own the Lock

Key Blanks

Impressioning Overlifting “Reflecting” keys Sectional keyways Rake keys Key bumping

Page 20: Attack the Key Own the Lock

Universal Handcuff Keys

Page 21: Attack the Key Own the Lock

Overlifting

Page 22: Attack the Key Own the Lock

Overlifting

Page 23: Attack the Key Own the Lock

Rake/Gypsy Keys

Page 24: Attack the Key Own the Lock

Impressioning

Page 25: Attack the Key Own the Lock

Impressioning

Works Forever!

Page 26: Attack the Key Own the Lock

Reflecting Keys

Page 27: Attack the Key Own the Lock
Page 28: Attack the Key Own the Lock
Page 29: Attack the Key Own the Lock
Page 30: Attack the Key Own the Lock

Sectional Keyways

Page 31: Attack the Key Own the Lock

Sectional Keyways

Page 32: Attack the Key Own the Lock

Incorrect Key

Master key decoding Bumping Skeleton keys Sidebar attacks Passive component bypasses Decoding attacks

Page 33: Attack the Key Own the Lock

Master Key Systems

Page 34: Attack the Key Own the Lock

Master Key Systems

Page 35: Attack the Key Own the Lock

Master Key Systems

Page 36: Attack the Key Own the Lock

Master Key Systems

Page 37: Attack the Key Own the Lock

Master Key Systems

Page 38: Attack the Key Own the Lock

Key Bumping

Basic physics

Specialized key

Easy, effective

Vendor response

Page 39: Attack the Key Own the Lock

How Bumping Works

Page 40: Attack the Key Own the Lock

Creating Bump Keys

Any key that fits Cut “999” key (deepest pin depths)

Use key gauges

Cut with Hand file, dremel, key cutter

Page 41: Attack the Key Own the Lock

Bump Keys

Page 42: Attack the Key Own the Lock

Key Bumping

Page 43: Attack the Key Own the Lock

Key Bumping

Page 44: Attack the Key Own the Lock

100% Efficiency...?

Page 45: Attack the Key Own the Lock

Don't underestimate

attackers...

Page 46: Attack the Key Own the Lock

Bumping Hammers

Page 47: Attack the Key Own the Lock

Side Pins

Page 48: Attack the Key Own the Lock

Side Pins

Page 49: Attack the Key Own the Lock

Side Pins

Page 50: Attack the Key Own the Lock

Side Pins

Page 51: Attack the Key Own the Lock

Side Pins

Page 52: Attack the Key Own the Lock

Regional Sidebar Attacks

ASSA Twin Combi Schlage Primus Fichet 480 The list goes on...

Schlage is doing it wrong.

Page 53: Attack the Key Own the Lock
Page 54: Attack the Key Own the Lock
Page 55: Attack the Key Own the Lock
Page 56: Attack the Key Own the Lock
Page 57: Attack the Key Own the Lock

One Last Way Schlage Is Doing It Wrong: LFIC

BEST SFIC Small Format

Interchangable Core

Schlage LFIC 6.5 Control Key

Page 58: Attack the Key Own the Lock

Passive Components

Page 59: Attack the Key Own the Lock

What have we learned?

Page 60: Attack the Key Own the Lock

Resources

openlocksport.com lockwiki.com lockpickingforensics.com ndemag.com

KICKSTARTER

Page 61: Attack the Key Own the Lock

Meet us at Q&A!