Zum Hauptinhalt springen
Dekorationsartikel gehören nicht zum Leistungsumfang.
Keys to the Kingdom
Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks
Taschenbuch von Deviant Ollam
Sprache: Englisch

57,95 €*

inkl. MwSt.

Versandkostenfrei per Post / DHL

Lieferzeit 1-2 Wochen

Kategorien:
Beschreibung
Lock picking has become a popular topic with many in the security community. While many have chosen to learn the fine art of opening locks without keys, few people explore the fascinating methods of attack that are possible WITH keys. Keys to the Kingdom addresses the topics of impressioning, master key escalation, skeleton keys, and bumping attacks that go well beyond any treatment of these topics in the author's previous book, Practical Lock Picking. This material is all new and focuses on locks currently in use as well as ones that have recently emerged on the market. Hackers and pen testers, or persons tasked with defending their infrastructure and property from invasion, will find these techniques uniquely valuable. As with Deviant Ollam's previous book, Practical Lock Picking, the companion website that accompanies Keys to the Kingdom includes full-color versions of all diagrams and photographs, along with instructional videos that provide readers with a full-on training seminar from the author. In addition, Keys to the Kingdom includes full-color illustrations and photos throughout the book to make learning easy. "Deviant's material is presented with rich, detailed diagrams and is offered in easy-to-follow lessons which allow even beginners to acquire the knowledge very quickly."--THE JOURNAL OF LAW ENFORCEMENT
Lock picking has become a popular topic with many in the security community. While many have chosen to learn the fine art of opening locks without keys, few people explore the fascinating methods of attack that are possible WITH keys. Keys to the Kingdom addresses the topics of impressioning, master key escalation, skeleton keys, and bumping attacks that go well beyond any treatment of these topics in the author's previous book, Practical Lock Picking. This material is all new and focuses on locks currently in use as well as ones that have recently emerged on the market. Hackers and pen testers, or persons tasked with defending their infrastructure and property from invasion, will find these techniques uniquely valuable. As with Deviant Ollam's previous book, Practical Lock Picking, the companion website that accompanies Keys to the Kingdom includes full-color versions of all diagrams and photographs, along with instructional videos that provide readers with a full-on training seminar from the author. In addition, Keys to the Kingdom includes full-color illustrations and photos throughout the book to make learning easy. "Deviant's material is presented with rich, detailed diagrams and is offered in easy-to-follow lessons which allow even beginners to acquire the knowledge very quickly."--THE JOURNAL OF LAW ENFORCEMENT
Über den Autor
Deviant Ollam's first and strongest love has always been teaching. A graduate of the New Jersey Institute of Technology's Science, Technology, and Society program, he is always fascinated by the interplay that connects human values and social trends to developments in the technical world. While earning his BS degree at NJIT, Deviant also completed the History degree program federated between that institution and Rutgers University. While paying the bills as a security auditor and penetration testing consultant with The CORE Group, Deviant is also a member of the Board of Directors of the U.S. division of TOOOL, The Open Organisation Of Lockpickers. Every year at DEFCON and ShmooCon, Deviant runs the Lockpick Village, and he has conducted physical security training sessions at Black Hat, DeepSec, ToorCon, HackCon, ShakaCon, HackInTheBox, CanSecWest, ekoparty, and the United States Military Academy at West Point. His favorite Amendments to the U.S. Constitution are, in no particular order, the 1st, 2nd, 9th, and 10th.
Inhaltsverzeichnis

Chapter 1. Key Impressioning

Chapter 2. Foil Key/Soft Key Attacks

Chapter 3. Master Key Privilege Escalation

Chapter 4. Key Bumping

Chapter 5. Skeleton Keys

Chapter 6. Cast and Mold Attacks

Chapter 7. Set-Up Keys

Chapter 8. Sight Decoding of Keys from Photos or in Real Life

Chapter 9. Decoding & Attacking User Re-Keyable Locks

Chapter 10. Construction Keying

Appendix - Indentifying Locks Based on Key Bow or Keyway Profile

Details
Erscheinungsjahr: 2012
Fachbereich: Datenkommunikation, Netze & Mailboxen
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Inhalt: Kartoniert / Broschiert
ISBN-13: 9781597499835
ISBN-10: 1597499838
Sprache: Englisch
Einband: Kartoniert / Broschiert
Autor: Ollam, Deviant
Redaktion: Lawson, Shane
Hersteller: Syngress Media,U.S.
Maße: 233 x 189 x 17 mm
Von/Mit: Deviant Ollam
Erscheinungsdatum: 26.09.2012
Gewicht: 0,62 kg
Artikel-ID: 106408591
Über den Autor
Deviant Ollam's first and strongest love has always been teaching. A graduate of the New Jersey Institute of Technology's Science, Technology, and Society program, he is always fascinated by the interplay that connects human values and social trends to developments in the technical world. While earning his BS degree at NJIT, Deviant also completed the History degree program federated between that institution and Rutgers University. While paying the bills as a security auditor and penetration testing consultant with The CORE Group, Deviant is also a member of the Board of Directors of the U.S. division of TOOOL, The Open Organisation Of Lockpickers. Every year at DEFCON and ShmooCon, Deviant runs the Lockpick Village, and he has conducted physical security training sessions at Black Hat, DeepSec, ToorCon, HackCon, ShakaCon, HackInTheBox, CanSecWest, ekoparty, and the United States Military Academy at West Point. His favorite Amendments to the U.S. Constitution are, in no particular order, the 1st, 2nd, 9th, and 10th.
Inhaltsverzeichnis

Chapter 1. Key Impressioning

Chapter 2. Foil Key/Soft Key Attacks

Chapter 3. Master Key Privilege Escalation

Chapter 4. Key Bumping

Chapter 5. Skeleton Keys

Chapter 6. Cast and Mold Attacks

Chapter 7. Set-Up Keys

Chapter 8. Sight Decoding of Keys from Photos or in Real Life

Chapter 9. Decoding & Attacking User Re-Keyable Locks

Chapter 10. Construction Keying

Appendix - Indentifying Locks Based on Key Bow or Keyway Profile

Details
Erscheinungsjahr: 2012
Fachbereich: Datenkommunikation, Netze & Mailboxen
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Inhalt: Kartoniert / Broschiert
ISBN-13: 9781597499835
ISBN-10: 1597499838
Sprache: Englisch
Einband: Kartoniert / Broschiert
Autor: Ollam, Deviant
Redaktion: Lawson, Shane
Hersteller: Syngress Media,U.S.
Maße: 233 x 189 x 17 mm
Von/Mit: Deviant Ollam
Erscheinungsdatum: 26.09.2012
Gewicht: 0,62 kg
Artikel-ID: 106408591
Warnhinweis

Ähnliche Produkte

Ähnliche Produkte