Attack the Key, Own the Lock

A session at Defcon 18

Locks restrict access to anyone lacking the correct key. As security
components, we depend on locks to secure our most valuable possessions.
Most attacks demonstrated in recent years involve manipulation of the
lock components with special picking tools, but what if we focused on
using incorrect or blank keys to make a variety of tools? Bumping is a
good example, but there are many other ways incorrect or modified keys
can be used to defeat locks. Like the cryptography world, physical
Keys are vulnerable to attack in even the highest security locks.

This talk focuses on using modified key blanks to open, decode, and
bypass modern lock designs, including many high security locks. We
demonstrate these attacks and discuss the security implications of
key-based attacks on modern lock designs.

About the speaker

This person is speaking at this event.
Schuyler Towne

Lockpicker, researcher, pretty nice dude.

Coverage of this session

Sign in to add slides, notes or videos to this session

Defcon 18

United States United States, Las Vegas

30th July to 1st August 2010

Tell your friends!


Date Sat 31st July 2010

Short URL


View the schedule


See something wrong?

Report an issue with this session