Bill Graydon - Duplicating Restricted Mechanical Keys - DEF CON 27 Conference
Secure facilities in North America use lock systems like Medeco, Abloy, Assa and Mul-T-Lock partly to resist lock picking, but also to prevent the duplication and creation of unauthorised keys. Places such as the White House and the Canadian Parliament buildings go so far as to use a key profile exclusive to that facility to ensure that no-one is able to obtain key blanks on which to make a copy. However, there are tens of thousands of unrestricted key blank profiles in existence - many match very closely to these restricted key blanks, and can be used instead of the real blanks to cut keys on. Moreover, keys are just pieces of metal - we will present numerous practical techniques to create restricted keys without authorisation - including new attacks on Medeco, Mul-T-Lock and Abloy key control systems. We will touch on all aspects of key control, including patents and interactive elements, and discuss how to defeat them and how facility managers can fight back against these attacks.
Bill Graydon
Bill Graydon is a principal at GGR Security Consultants, and is active in research in electronic surveillance and alarm systems, human psychology in a secure environment and locking systems analysis. He received a Masters in computer engineering and a certificate in forensic engineering from the University of Toronto, applying this at GGR to develop rigorous computational frameworks to model and improve security in the physical world.
Website: https://ggrsecurity.com/DEFCON
Robert Graydon
Robert is a principal at GGR security. With a strong interest driving him forward, he is researching lock manipulation, picking, bypass, and other vulnerabilities, to discover and evaluate possible flaws or methods of attack. He has well-honed skills such as lock picking, decoding, locksmithing, as well as a thorough understanding of the mechanics and function of many types of high security locks, and electronic security systems and components, allowing him to effectively search for and test methods of cracking high security systems.
Видео Bill Graydon - Duplicating Restricted Mechanical Keys - DEF CON 27 Conference канала DEFCONConference
Bill Graydon
Bill Graydon is a principal at GGR Security Consultants, and is active in research in electronic surveillance and alarm systems, human psychology in a secure environment and locking systems analysis. He received a Masters in computer engineering and a certificate in forensic engineering from the University of Toronto, applying this at GGR to develop rigorous computational frameworks to model and improve security in the physical world.
Website: https://ggrsecurity.com/DEFCON
Robert Graydon
Robert is a principal at GGR security. With a strong interest driving him forward, he is researching lock manipulation, picking, bypass, and other vulnerabilities, to discover and evaluate possible flaws or methods of attack. He has well-honed skills such as lock picking, decoding, locksmithing, as well as a thorough understanding of the mechanics and function of many types of high security locks, and electronic security systems and components, allowing him to effectively search for and test methods of cracking high security systems.
Видео Bill Graydon - Duplicating Restricted Mechanical Keys - DEF CON 27 Conference канала DEFCONConference
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
DEF CON 25 Wifi Village - Matt Blaze - Sigint for the rest of usDEF CON 26 - m010ch - Please Do Not Duplicate Attacking the Knox BoxJmaxxz - Your Car is My Car - DEF CON 27 ConferenceBabak Javadi - Basics of Hacking Physical Access Control Systems - DEF CON 27 Wireless VillageDEF CON 27 (2019) - Finding Secrets In Publicly Exposed EBS Volumes - Ben MorrisDuplicating Keys | Duplicating Restricted Mechanical Keys | Bill Graydon DEF CON 27 ConferenceMicah Zenko - Red Teaming Insights and Examples from Beyond - DEF CON 27 Social Engineering VillageRadio Hacking: Cars, Hardware, and more! - Samy Kamkar - AppSec California 2016Andreas Baumhof - Are Quantum Computers Really A Threat To Cryptography? - DEF CON 27 ConferenceFinishing and Testing the Homemade Tracer AttachmentDEF CON 29 - Roy Davis - No Key No PIN No Combo No Problem Pwning ATMs For Fun and ProfitThe Ricks - WCTF Gear Talk - DEF CON 27 Wireless VillageBrad Dixon - Cheating in eSports How to Cheat at Virtual Cycling - DEF CON 27 ConferenceLPU Teardown 16: PROTEC 2Nina Kollars - Confessions of an Nespresso Money Mule - DEF CON 27 Conference(1541) New PacLocks in Home Depot #2DEF CON 29 - Vivek Nair - Time Turner Hacking RF Attendance Systems To Be in Two Places at OnceBlack Hat 2013 - Exploiting Network Surveillance Cameras Like a Hollywood HackerRobin Dreeke - Sizing People Up - DEF CON 27 Social Engineering Village