DEFCON 17: Lockpicking Forensics
Speaker: Datagram
Lockpicking is portrayed as the ultimate entry method. Undetectable and instantaneous as far as films are concerned. Nothing is further from the truth, but freely available information on the topic is nearly impossible to find. This talk will focus on the small but powerful fragments of evidence left by various forms of bypass, lockpicking, and impressioning. Attendees will learn how to distinguish tool marks from normal wear and tear, identify the specific techniques and tools used, and understand the process of forensic locksmithing in detail.
For more information visit: http://bit.ly/defcon17_information
To download the video visit: http://bit.ly/defcon17_videos
Видео DEFCON 17: Lockpicking Forensics канала Christiaan008
Lockpicking is portrayed as the ultimate entry method. Undetectable and instantaneous as far as films are concerned. Nothing is further from the truth, but freely available information on the topic is nearly impossible to find. This talk will focus on the small but powerful fragments of evidence left by various forms of bypass, lockpicking, and impressioning. Attendees will learn how to distinguish tool marks from normal wear and tear, identify the specific techniques and tools used, and understand the process of forensic locksmithing in detail.
For more information visit: http://bit.ly/defcon17_information
To download the video visit: http://bit.ly/defcon17_videos
Видео DEFCON 17: Lockpicking Forensics канала Christiaan008
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Defcon 21 - Stalking a City for Fun and FrivolityDEFCON 19 (2011) - Lock Designs for Government and Commerce: Deconstruction Insecurity[318] Banggood 12 Piece Pick Set and Transparent Padlock ReviewDeviant Ollam | The Four Types of Locks | SOURCE Conference Boston 2010Does Dropping USB Drives in Parking Lots and Other Places Really Work?Intro To Locksmith Training[884] Removing the Scammer’s Boot... FASTDefcon 21 - Doing Bad Things to "Good" Security AppliancesDEF CON 19 - Matt 'openfly' Joyce - The Art of TrollingDEF CON 24 - Anthony Rose, Ben Ramsey - Picking Bluetooth Low Energy Locks a Quarter Mille AwayThe Search for the Perfect Door - Deviant OllamDEFCON 13: Introduction to Lockpicking and Physical SecurityInfecting the Enterprise: Abusing Office365+Powershell for Covert C2Defcon 21 - A Password is Not Enough: Why Disk Encryption is Broken and How We Might Fix ItBill Graydon - Duplicating Restricted Mechanical Keys - DEF CON 27 ConferenceHow to Pick a LockDEFCON 17: Screen Scraper Tricks: Extracting Data from Difficult WebsitesPEDAL JACK Anti Theft Device ReviewWhat's on the Wireless? Automating RF Signal Identification