Загрузка страницы

Jos Weyers – Lock Impressioning

https://www.hacktivity.com

We've all seen lockpicking explained on several security venues. You might even have tried it yourself. But what if you need to open a lock a number of times? Wouldn't it be great to have an opening technique that would supply you with a working key in the process?

A method to do this has existed for quite some time, but until recently it has remained quite unknown. Some time ago impressioning locks got "re-invented" by the lockpick community and the skill evolved to the level now shown at several international championships.

Unlike lockpicking, impressioning creates a fully working key for the lock which can be used to lock and unlock the cylinder at will. With practice, this technique can consistently open a lock in 10-15 minutes (and potentially faster)!

What is it? How does it work? What skill is involved? Why is it the most interesting way to open a lock? These questions, and more will be answered in this talk.

Видео Jos Weyers – Lock Impressioning канала Hacktivity - IT Security Festival
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
29 ноября 2016 г. 18:00:22
00:45:47
Другие видео канала
Balint Varga-Perke, 'Buherator' - Heureka - The Suspicious Thing Is That It's Not SuspiciousBalint Varga-Perke, 'Buherator' - Heureka - The Suspicious Thing Is That It's Not Suspicious#Hacktivity2019 - Interjú a Duna TV Családbarát című műsorában (in Hungarian)#Hacktivity2019 - Interjú a Duna TV Családbarát című műsorában (in Hungarian)Csaba Krasznay - Cyber soldiers in the world -- how to become a military hacker?Csaba Krasznay - Cyber soldiers in the world -- how to become a military hacker?MTVA Híradó - Élő bejelentkezés a Hacktivity konferenciárólMTVA Híradó - Élő bejelentkezés a Hacktivity konferenciáról#Hacktivity2022 // Broad View to Automotive Security & Penn testing by András Kabai & László Tóth#Hacktivity2022 // Broad View to Automotive Security & Penn testing by András Kabai & László Tóth#Hacktivity2020 // Paste Wars: fighting for copypaste freedom by Ignat Korchagin#Hacktivity2020 // Paste Wars: fighting for copypaste freedom by Ignat KorchaginKirils Solovjovs - Tools for effortless reverse engineering of MikroTik routersKirils Solovjovs - Tools for effortless reverse engineering of MikroTik routers#Hacktivity2022 // Security in IoT – the Investigation of Bluetooth Low Energy by János Kepics#Hacktivity2022 // Security in IoT – the Investigation of Bluetooth Low Energy by János Kepics#Hacktivity2019 - Summary of the 16th Edition // 25-26 October 2019#Hacktivity2019 - Summary of the 16th Edition // 25-26 October 2019Best of Hacktivity 2013 officialBest of Hacktivity 2013 officialOmar Eissa - Network Automation is not your Safe HavenOmar Eissa - Network Automation is not your Safe HavenStephan Gerling - Hacking Yachts Remotely via Satcom or Maritime Internet RouterStephan Gerling - Hacking Yachts Remotely via Satcom or Maritime Internet RouterGábor Szappanos – Comparing the incomparablesGábor Szappanos – Comparing the incomparables#Hacktivity2021 // 4 Weird Google VRP Bugs in 40 Minutes#Hacktivity2021 // 4 Weird Google VRP Bugs in 40 MinutesGergely Révay - Security implications of the Cross-Origin Resource SharingGergely Révay - Security implications of the Cross-Origin Resource Sharing#Hacktivity2023 // Elevating OAuth2.0 for Security of Native Clients#Hacktivity2023 // Elevating OAuth2.0 for Security of Native ClientsKelly Shortridge - To Err is Human / Keynote PresentationKelly Shortridge - To Err is Human / Keynote Presentation#Hacktivity2022 // Cybersecurity Cannot Ignore Climate Change by Chloé Messdaghi#Hacktivity2022 // Cybersecurity Cannot Ignore Climate Change by Chloé Messdaghi#Hacktivity2018 - Summary of the 15. Jubilee Edition // 12-13 October 2018#Hacktivity2018 - Summary of the 15. Jubilee Edition // 12-13 October 2018#Hacktivity2022 // How to Kickstart a Security Program? by Ottucsák József#Hacktivity2022 // How to Kickstart a Security Program? by Ottucsák József#Hacktivity2021 // The Key to an "Entire Kingdom": Pandora FMS - Chained Exploit (CVE-2021-34074)#Hacktivity2021 // The Key to an "Entire Kingdom": Pandora FMS - Chained Exploit (CVE-2021-34074)
Яндекс.Метрика