Keys to the kingdom impressioning, privilege escalation, bumping, and other key-based attacks against physical locks

Lockpicking has become a popular topic with many in the security community. While many have chosen to learn the fine art of opening locks without keys, few people explore the fascinating methods of attack that are possible WITH keys. Keys to the Kingdom addresses the topics of impressioning, master...

Full description

Bibliographic Details
Main Author: Ollam, Deviant
Format: eBook
Language:English
Published: Waltham, MA Syngress/Elsevier 2012
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
Table of Contents:
  • Front Cover
  • Keys to the Kingdom
  • Copyright Page
  • Contents
  • Author's Note
  • About the Author
  • About the Technical Editor
  • 1 Impressioning
  • The Mechanics of Pin Tumbler Locks
  • Pin tumbler lock operation
  • Pin tumbler lock imperfections
  • What Is Impressioning?
  • It is quite simple
  • Why Choose Impressioning?
  • The watchful eye
  • Day and night
  • Quite nice, but can you do it twice?
  • How Impressioning Works
  • What do these marks indicate?
  • File marks when you see them, don't file when you don't
  • Tips and Tricks
  • Seeing the mark is hard!
  • Prepare your work surface
  • Using specially-marked keys
  • Lighting and magnification
  • More tips for spotting the mark
  • Some advice concerning filing
  • How much to file
  • File types and shapes
  • Filing technique
  • Maintain a clean work area
  • Take care to avoid "canyoning"
  • Impressioning handles
  • If you run into trouble
  • Open!
  • Locks That Resist Impressioning
  • Training Aids and Exercises
  • Summary
  • 2 Soft Medium Attacks
  • Foil Keys
  • Preparing a foil attack key
  • Foil impressioning kits
  • When foil fails
  • Wax Keys
  • Mold-and-Cast Attacks
  • Quick Key copying
  • Summary
  • 3 Master-Keyed Systems
  • Introduction
  • How Master-Keying Works
  • Attacking Master-Keyed Systems
  • Other Methods of Master Key Compromise
  • Target a lock no one will miss
  • Target a lock that is rarely used
  • Defending Against This Attack
  • Maison-Keying
  • Summary
  • 4 Bump Keys
  • Introduction
  • Snapping Attacks
  • Bump Keys
  • What makes a key a bump key?
  • The "pull" bump method
  • The "push" bump method
  • Tip-stopped keys
  • Sidebar mechanisms
  • A few tips about technique
  • Bump-resistant and bump-proof locks
  • Master Lock's bumpstop technology
  • The Ilco anti-bump pin
  • Restrictions on key cutting
  • Summary
  • 5 Overlifting
  • Introduction
  • Rear Shimming
  • Overlifting Wafers
  • Overlifting Pins
  • Summary
  • 6 Skeleton Keys
  • Introduction
  • Warded Locks
  • Let's look inside
  • Where's the security?
  • Simple Skeleton Keys
  • A more universal skeleton key
  • More Complicated Skeleton Keys
  • Warded Picks
  • Types of Warded Locks
  • Summary
  • 7 SmartKey Attacks
  • Introduction
  • The Kwikset SmartKey system
  • Decoding SmartKey locks
  • Summary
  • 8 Don't Let Your Keys Talk to Strangers
  • Introduction
  • Key Decoding
  • Depth keys
  • Key Photographing
  • Making Keys Resistant to Decoding
  • One More Trick Up Your Sleeve
  • Summary
  • Index
  • Includes bibliographical references