Lock picking has become a popular topic with many in the security community. While many have chosen to learn the fine art of opening locks without keys, few people explore the fascinating methods of attack that are possible WITH keys. Keys to the Kingdom addresses the topics of impressioning, master key escalation, skeleton keys, and bumping attacks that go well beyond any treatment of these topics in the author's previous book, Practical Lock Picking. This material is all new and focuses on locks currently in use as well as ones that have recently emerged on the market. Hackers and pen testers, or persons tasked with defending their infrastructure and property from invasion, will find these techniques uniquely valuable. As with Deviant Ollam's previous book, Practical Lock Picking, the companion website that accompanies Keys to the Kingdom includes full-color versions of all diagrams and photographs, along with instructional videos that provide readers with a full-on training seminar from the author. In addition, Keys to the Kingdom includes full-color illustrations and photos throughout the book to make learning easy. "Deviant's material is presented with rich, detailed diagrams and is offered in easy-to-follow lessons which allow even beginners to acquire the knowledge very quickly."--THE JOURNAL OF LAW ENFORCEMENT
Lock picking has become a popular topic with many in the security community. While many have chosen to learn the fine art of opening locks without keys, few people explore the fascinating methods of attack that are possible WITH keys. Keys to the Kingdom addresses the topics of impressioning, master key escalation, skeleton keys, and bumping attacks that go well beyond any treatment of these topics in the author's previous book, Practical Lock Picking. This material is all new and focuses on locks currently in use as well as ones that have recently emerged on the market. Hackers and pen testers, or persons tasked with defending their infrastructure and property from invasion, will find these techniques uniquely valuable. As with Deviant Ollam's previous book, Practical Lock Picking, the companion website that accompanies Keys to the Kingdom includes full-color versions of all diagrams and photographs, along with instructional videos that provide readers with a full-on training seminar from the author. In addition, Keys to the Kingdom includes full-color illustrations and photos throughout the book to make learning easy. "Deviant's material is presented with rich, detailed diagrams and is offered in easy-to-follow lessons which allow even beginners to acquire the knowledge very quickly."--THE JOURNAL OF LAW ENFORCEMENT
Über den Autor
Deviant Ollam's first and strongest love has always been teaching. A graduate of the New Jersey Institute of Technology's Science, Technology, and Society program, he is always fascinated by the interplay that connects human values and social trends to developments in the technical world. While earning his BS degree at NJIT, Deviant also completed the History degree program federated between that institution and Rutgers University. While paying the bills as a security auditor and penetration testing consultant with The CORE Group, Deviant is also a member of the Board of Directors of the U.S. division of TOOOL, The Open Organisation Of Lockpickers. Every year at DEFCON and ShmooCon, Deviant runs the Lockpick Village, and he has conducted physical security training sessions at Black Hat, DeepSec, ToorCon, HackCon, ShakaCon, HackInTheBox, CanSecWest, ekoparty, and the United States Military Academy at West Point. His favorite Amendments to the U.S. Constitution are, in no particular order, the 1st, 2nd, 9th, and 10th.
Inhaltsverzeichnis
Chapter 1. Key Impressioning
Chapter 2. Foil Key/Soft Key Attacks
Chapter 3. Master Key Privilege Escalation
Chapter 4. Key Bumping
Chapter 5. Skeleton Keys
Chapter 6. Cast and Mold Attacks
Chapter 7. Set-Up Keys
Chapter 8. Sight Decoding of Keys from Photos or in Real Life
Chapter 9. Decoding & Attacking User Re-Keyable Locks
Chapter 10. Construction Keying
Appendix - Indentifying Locks Based on Key Bow or Keyway Profile