the search for the perfect door - deviant ollam

Post on 26-Jan-2017

199 Views

Category:

Devices & Hardware

21 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Physical Security Ideal Doors amp Padlocks

Deviant OllamShakaCon ndash 20160713

Who Am I

httpenterthecorenet

Security Consultant By Day

httpenterthecorenet

Criminal Consultant By Night

httpenterthecorenet

Basicallyhellip Irsquom Professionally Dangerous

Why Does Physical Security Matter

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

From the onset KWC was adamant that no evidence of

unauthorized access had been uncovered It became clear

that KWC management was aware of potential unauthorized

access into the OT systems of the water district

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

From the onset KWC was adamant that no evidence of

unauthorized access had been uncovered It became clear

that KWC management was aware of potential unauthorized

access into the OT systems of the water district

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

Access to customer water usage PII and payment data required only a username and password

No second authentication factor was needed Next we found a direct cable connection between

the application and the AS400 system Making matters worse the AS400 system had open access

to the internet and its internal IP address and administrative credentials were found on the

payment application webserver in clear text within an initialization file

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

But with a Physical Breachhellip

httpenterthecorenet

All of your firewall ruleshellip

httpenterthecorenet

All of your firewall ruleshellip can be compromised

httpenterthecorenet

All your hard work herehellip

httpenterthecorenet

All your hard work herehellip gets undermined here

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

Who Am I

httpenterthecorenet

Security Consultant By Day

httpenterthecorenet

Criminal Consultant By Night

httpenterthecorenet

Basicallyhellip Irsquom Professionally Dangerous

Why Does Physical Security Matter

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

From the onset KWC was adamant that no evidence of

unauthorized access had been uncovered It became clear

that KWC management was aware of potential unauthorized

access into the OT systems of the water district

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

From the onset KWC was adamant that no evidence of

unauthorized access had been uncovered It became clear

that KWC management was aware of potential unauthorized

access into the OT systems of the water district

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

Access to customer water usage PII and payment data required only a username and password

No second authentication factor was needed Next we found a direct cable connection between

the application and the AS400 system Making matters worse the AS400 system had open access

to the internet and its internal IP address and administrative credentials were found on the

payment application webserver in clear text within an initialization file

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

But with a Physical Breachhellip

httpenterthecorenet

All of your firewall ruleshellip

httpenterthecorenet

All of your firewall ruleshellip can be compromised

httpenterthecorenet

All your hard work herehellip

httpenterthecorenet

All your hard work herehellip gets undermined here

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Security Consultant By Day

httpenterthecorenet

Criminal Consultant By Night

httpenterthecorenet

Basicallyhellip Irsquom Professionally Dangerous

Why Does Physical Security Matter

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

From the onset KWC was adamant that no evidence of

unauthorized access had been uncovered It became clear

that KWC management was aware of potential unauthorized

access into the OT systems of the water district

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

From the onset KWC was adamant that no evidence of

unauthorized access had been uncovered It became clear

that KWC management was aware of potential unauthorized

access into the OT systems of the water district

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

Access to customer water usage PII and payment data required only a username and password

No second authentication factor was needed Next we found a direct cable connection between

the application and the AS400 system Making matters worse the AS400 system had open access

to the internet and its internal IP address and administrative credentials were found on the

payment application webserver in clear text within an initialization file

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

But with a Physical Breachhellip

httpenterthecorenet

All of your firewall ruleshellip

httpenterthecorenet

All of your firewall ruleshellip can be compromised

httpenterthecorenet

All your hard work herehellip

httpenterthecorenet

All your hard work herehellip gets undermined here

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Criminal Consultant By Night

httpenterthecorenet

Basicallyhellip Irsquom Professionally Dangerous

Why Does Physical Security Matter

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

From the onset KWC was adamant that no evidence of

unauthorized access had been uncovered It became clear

that KWC management was aware of potential unauthorized

access into the OT systems of the water district

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

From the onset KWC was adamant that no evidence of

unauthorized access had been uncovered It became clear

that KWC management was aware of potential unauthorized

access into the OT systems of the water district

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

Access to customer water usage PII and payment data required only a username and password

No second authentication factor was needed Next we found a direct cable connection between

the application and the AS400 system Making matters worse the AS400 system had open access

to the internet and its internal IP address and administrative credentials were found on the

payment application webserver in clear text within an initialization file

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

But with a Physical Breachhellip

httpenterthecorenet

All of your firewall ruleshellip

httpenterthecorenet

All of your firewall ruleshellip can be compromised

httpenterthecorenet

All your hard work herehellip

httpenterthecorenet

All your hard work herehellip gets undermined here

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Basicallyhellip Irsquom Professionally Dangerous

Why Does Physical Security Matter

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

From the onset KWC was adamant that no evidence of

unauthorized access had been uncovered It became clear

that KWC management was aware of potential unauthorized

access into the OT systems of the water district

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

From the onset KWC was adamant that no evidence of

unauthorized access had been uncovered It became clear

that KWC management was aware of potential unauthorized

access into the OT systems of the water district

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

Access to customer water usage PII and payment data required only a username and password

No second authentication factor was needed Next we found a direct cable connection between

the application and the AS400 system Making matters worse the AS400 system had open access

to the internet and its internal IP address and administrative credentials were found on the

payment application webserver in clear text within an initialization file

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

But with a Physical Breachhellip

httpenterthecorenet

All of your firewall ruleshellip

httpenterthecorenet

All of your firewall ruleshellip can be compromised

httpenterthecorenet

All your hard work herehellip

httpenterthecorenet

All your hard work herehellip gets undermined here

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

Why Does Physical Security Matter

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

From the onset KWC was adamant that no evidence of

unauthorized access had been uncovered It became clear

that KWC management was aware of potential unauthorized

access into the OT systems of the water district

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

From the onset KWC was adamant that no evidence of

unauthorized access had been uncovered It became clear

that KWC management was aware of potential unauthorized

access into the OT systems of the water district

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

Access to customer water usage PII and payment data required only a username and password

No second authentication factor was needed Next we found a direct cable connection between

the application and the AS400 system Making matters worse the AS400 system had open access

to the internet and its internal IP address and administrative credentials were found on the

payment application webserver in clear text within an initialization file

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

But with a Physical Breachhellip

httpenterthecorenet

All of your firewall ruleshellip

httpenterthecorenet

All of your firewall ruleshellip can be compromised

httpenterthecorenet

All your hard work herehellip

httpenterthecorenet

All your hard work herehellip gets undermined here

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

From the onset KWC was adamant that no evidence of

unauthorized access had been uncovered It became clear

that KWC management was aware of potential unauthorized

access into the OT systems of the water district

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

From the onset KWC was adamant that no evidence of

unauthorized access had been uncovered It became clear

that KWC management was aware of potential unauthorized

access into the OT systems of the water district

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

Access to customer water usage PII and payment data required only a username and password

No second authentication factor was needed Next we found a direct cable connection between

the application and the AS400 system Making matters worse the AS400 system had open access

to the internet and its internal IP address and administrative credentials were found on the

payment application webserver in clear text within an initialization file

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

But with a Physical Breachhellip

httpenterthecorenet

All of your firewall ruleshellip

httpenterthecorenet

All of your firewall ruleshellip can be compromised

httpenterthecorenet

All your hard work herehellip

httpenterthecorenet

All your hard work herehellip gets undermined here

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

From the onset KWC was adamant that no evidence of

unauthorized access had been uncovered It became clear

that KWC management was aware of potential unauthorized

access into the OT systems of the water district

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

From the onset KWC was adamant that no evidence of

unauthorized access had been uncovered It became clear

that KWC management was aware of potential unauthorized

access into the OT systems of the water district

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

Access to customer water usage PII and payment data required only a username and password

No second authentication factor was needed Next we found a direct cable connection between

the application and the AS400 system Making matters worse the AS400 system had open access

to the internet and its internal IP address and administrative credentials were found on the

payment application webserver in clear text within an initialization file

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

But with a Physical Breachhellip

httpenterthecorenet

All of your firewall ruleshellip

httpenterthecorenet

All of your firewall ruleshellip can be compromised

httpenterthecorenet

All your hard work herehellip

httpenterthecorenet

All your hard work herehellip gets undermined here

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

From the onset KWC was adamant that no evidence of

unauthorized access had been uncovered It became clear

that KWC management was aware of potential unauthorized

access into the OT systems of the water district

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

Access to customer water usage PII and payment data required only a username and password

No second authentication factor was needed Next we found a direct cable connection between

the application and the AS400 system Making matters worse the AS400 system had open access

to the internet and its internal IP address and administrative credentials were found on the

payment application webserver in clear text within an initialization file

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

But with a Physical Breachhellip

httpenterthecorenet

All of your firewall ruleshellip

httpenterthecorenet

All of your firewall ruleshellip can be compromised

httpenterthecorenet

All your hard work herehellip

httpenterthecorenet

All your hard work herehellip gets undermined here

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Lots of Folk Are Discussing Network Security

Kemuri Water Company was responsible for supplying and

metering water usage over a number of neighboring counties

An unexplained pattern of valve and duct movements had occurred

over the previous 60 days These movements consisted of

manipulating the PLCs that managed the amount of chemicals used

to treat the water to make it safe to drink as well as affecting the

water flow rate causing disruptions with water distribution

Access to customer water usage PII and payment data required only a username and password

No second authentication factor was needed Next we found a direct cable connection between

the application and the AS400 system Making matters worse the AS400 system had open access

to the internet and its internal IP address and administrative credentials were found on the

payment application webserver in clear text within an initialization file

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

But with a Physical Breachhellip

httpenterthecorenet

All of your firewall ruleshellip

httpenterthecorenet

All of your firewall ruleshellip can be compromised

httpenterthecorenet

All your hard work herehellip

httpenterthecorenet

All your hard work herehellip gets undermined here

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

But with a Physical Breachhellip

httpenterthecorenet

All of your firewall ruleshellip

httpenterthecorenet

All of your firewall ruleshellip can be compromised

httpenterthecorenet

All your hard work herehellip

httpenterthecorenet

All your hard work herehellip gets undermined here

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Lots of Folk Are Discussing Network Security

httpenterthecorenet

But with a Physical Breachhellip

httpenterthecorenet

All of your firewall ruleshellip

httpenterthecorenet

All of your firewall ruleshellip can be compromised

httpenterthecorenet

All your hard work herehellip

httpenterthecorenet

All your hard work herehellip gets undermined here

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

But with a Physical Breachhellip

httpenterthecorenet

All of your firewall ruleshellip

httpenterthecorenet

All of your firewall ruleshellip can be compromised

httpenterthecorenet

All your hard work herehellip

httpenterthecorenet

All your hard work herehellip gets undermined here

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

All of your firewall ruleshellip

httpenterthecorenet

All of your firewall ruleshellip can be compromised

httpenterthecorenet

All your hard work herehellip

httpenterthecorenet

All your hard work herehellip gets undermined here

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

All of your firewall ruleshellip can be compromised

httpenterthecorenet

All your hard work herehellip

httpenterthecorenet

All your hard work herehellip gets undermined here

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

All your hard work herehellip

httpenterthecorenet

All your hard work herehellip gets undermined here

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

All your hard work herehellip gets undermined here

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Hands-On Attacks are Possible On-Site

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Not To Mentionhellip Outright Theft Damage and Tampering

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

Whatrsquos Wrong With Your Door

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

The Lock

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Lockpicking is Easy

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Opening with a Key

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Opening with Lockpicks

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Lockpicking is a Topic for Later

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

The Hinges

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Hinge Removal

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Security Hinges amp Jamb Pin Screws

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

The Latch

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Door Latch Attacks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Shrum Tools Traveler Hooks

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Slimjim Tools

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Protective Plates

2015-08-24T141930-0700

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Dead Latches

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Dead Latches Rely on Proper Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Door Fitment

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Door Fitment

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

The Inside Handles

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Crash Bars

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Crash Bars

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Exit Paddles

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Deadbolt with Thumb Turn

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Thumb Turn Flipper

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Key Boxes

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Key Boxes

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Emergency Boxes

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Municipal amp Contractor Boxes

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Decoding Multi-Wheel Combinations

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

Edge Gaps

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Edge Gaps and Motion Sensors

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Request-to-Exit (REX) Sensors

Passive Infrared (PIR)

Range Controlled Radar (RCR)

Hybrid of Both

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

The Bottom Gap

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Modern Door Lever Style Handles

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Under Door Attacks

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Under Door Attack Prevention ndash Security Door Bottom

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Shroud

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Under Door Attack Prevention ndash Blocking Clips

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

The Doorframe

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Door Frame Spreading

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Hammerhead Deadbolt

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

What About Padlocks

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Padlocks

first some terminologyhellip

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

The Shackle

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

The Body

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

The Keyway amp Plug

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

The Pin Stacks

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

The Release or Cam

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

The Latch (often two Latches)

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

Attacking The Latcheshellip Shimming

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Padlock Shims

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Homebrew Padlock Shims

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Single Latch or Dual Latch

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Shim-Proof Padlockshellip Double-Ball Mechanism

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

Attacking With Skeleton Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Warded Locks

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Distinct Keyway

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Warded Keys

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Warded Locks

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Warded Locks

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

Attacking The Pin Stackshellip Overlifting

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Comb Picks

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Overlifting Shouldnrsquot Be Possible Buthellip

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Overlifting is Possible with Improperly Designed Locks

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Overlifting with Comb Picks

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Overlifting with Comb Picks

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

Attacking The Release or Camhellip Bypassing

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Lock Bypassing ndash Master 175

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Lock Bypassing ndash American Padlocks

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Lock Bypassing ndash American Padlocks

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

Where Do We Encounter These Padlocks

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Are There Vulnerable Locks on Your Sites

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

Thinking Critically About Your Doors Too

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

A Door With Problems

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

A Door With Problems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Magnetic Lock Systems

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Magnetic Lock Systems

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

Threats Come From All Angles

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Cloning Electronic Credentials

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Cloning Electronic Credentials

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

In Conclusion

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Padlock Attacks and Mitigations

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Padlock Attacks and Mitigations

component latches

attack shimming

mitigation double ball shim-proof mechanism

component warded key systems

attack skeleton keys

mitigation never use these for any reason

component pin stacks

attack overlifting with comb picks

mitigation proper fabrication dimensions

component release cam

attack bypassing

mitigation blocking elements or key-retaining

systems immune to bypassing

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Very Robust Padlocks

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Very Robust Padlocks - Abloy Protec

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Very Robust Padlocks - Abus 8345

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Very Robust Padlocks - Abus 8353

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn crash bar etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Door Attacks and Mitigations

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

component hinges

attack removing the pins

mitigation security hinges or jamb pin screws

component latches

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn etc - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Door Attacks and Mitigations

component hinges - $50

attack removing the pins

mitigation security hinges or jamb pin screws

component latches - $150

attack loiding

mitigation anti-thrust latch properly installed

component inside thumb turn - $200

attack reach-through tools thumb turner

mitigation good deadbolt door fitment

component key boxes - $0

attack weak locks can be picked

mitigation remove them or get a variance

component edge gaps - $150

attack tricking sensors amp electronic locks

mitigation better sensors security astragal

component bottom gap - $60

attack under door attacks

mitigation security door bottom andor

blocking shroud

component doorframe - $200

attack jacking spreading attacks

mitigation interlocking deadbolt along with

stronger frame structure

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Door Attacks and Mitigations

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Door Attacks and Mitigations

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

Stay Safe Out There

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

httpenterthecorenet

Thank You Very Much

httpenterthecorenet

+1-347-263-7522

deltaenterthecorenet

(PGP keys on major servers)

  • Physical Security Ideal Doors amp Padlocks
  • Who Am I
  • Security Consultant By Day
  • Criminal Consultant By Night
  • Basicallyhellip Irsquom Professionally Dangerous
  • Why Does Physical Security Matter
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • Lots of Folk Are Discussing Network Security
  • But with a Physical Breachhellip
  • All of your firewall ruleshellip
  • All of your firewall ruleshellip can be compromised
  • All your hard work herehellip
  • All your hard work herehellipgets undermined here
  • Hands-On Attacks are Possible On-Site
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Not To Mentionhellip Outright Theft Damage and Tampering
  • Whatrsquos Wrong With Your Door
  • The Lock
  • Lockpicking is Easy
  • Opening with a Key
  • Opening with Lockpicks
  • Lockpicking is a Topic for Later
  • The Hinges
  • Hinge Removal
  • Hinge Removal
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • Security Hinges amp Jamb Pin Screws
  • The Latch
  • Door Latch Attacks
  • Door Latch Attacks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Shrum Tools Traveler Hooks
  • Slimjim Tools
  • Slimjim Tools
  • Slimjim Tools
  • Protective Plates
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches
  • Dead Latches Rely on Proper Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • Door Fitment
  • The Inside Handles
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Crash Bars
  • Exit Paddles
  • Deadbolt with Thumb Turn
  • Thumb Turn Flipper
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Key Boxes
  • Emergency Boxes
  • Municipal amp Contractor Boxes
  • Decoding Multi-Wheel Combinations
  • Edge Gaps
  • Edge Gaps and Motion Sensors
  • Edge Gaps and Motion Sensors
  • Request-to-Exit (REX) SensorsPassive Infrared (PIR)Range Controlled Radar (RCR)Hybrid of Both
  • The Bottom Gap
  • Modern Door Lever Style Handles
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attacks
  • Under Door Attack Prevention ndash Security Door Bottom
  • Under Door Attack Prevention ndash Blocking Shroud
  • Under Door Attack Prevention ndash Blocking Clips
  • Under Door Attack Prevention ndash Blocking Clips
  • The Doorframe
  • Door Frame Spreading
  • Hammerhead Deadbolt
  • What About Padlocks
  • Padlocks
  • The Shackle
  • The Body
  • The Keyway amp Plug
  • The Pin Stacks
  • The Release or Cam
  • The Latch (often two Latches)
  • Attacking The Latcheshellip Shimming
  • Padlock Shims
  • Padlock Shims
  • Homebrew Padlock Shims
  • Single Latch or Dual Latch
  • Shim-Proof Padlockshellip Double-Ball Mechanism
  • Attacking With Skeleton Keys
  • Warded Locks
  • Distinct Keyway
  • Warded Keys
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Warded Locks
  • Attacking The Pin Stackshellip Overlifting
  • Comb Picks
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible
  • Overlifting Shouldnrsquot Be Possible Buthellip
  • Overlifting is Possible with Improperly Designed Locks
  • Overlifting with Comb Picks
  • Overlifting with Comb Picks
  • Attacking The Release or Camhellip Bypassing
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash Master 175
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Lock Bypassing ndash American Padlocks
  • Where Do We Encounter These Padlocks
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Are There Vulnerable Locks on Your Sites
  • Thinking Critically About Your Doors Too
  • A Door With Problems
  • A Door With Problems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Magnetic Lock Systems
  • Threats Come From All Angles
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • Cloning Electronic Credentials
  • In Conclusion
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Padlock Attacks and Mitigations
  • Very Robust Padlocks
  • Very Robust Padlocks - Abloy Protec
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8345
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Very Robust Padlocks - Abus 8353
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Door Attacks and Mitigations
  • Stay Safe Out There
  • Thank You Very Much

top related