Reverse Engineering RET Homepage RET Members Reverse Engineering Projects Reverse Engineering Papers Reversing Challenges Reverser Tools RET Re-Search Engine Reverse Engineering Forum Reverse Engineering Links

Go Back   Reverse Engineering Team Board > Reverse Engineering Board > Reverse/Social Engineering
FAQ Members List Calendar Search Today's Posts Mark Forums Read

Reply
 
Thread Tools Display Modes
  #11  
Old 12-16-2002, 01:09 AM
nblender nblender is offline
Junior Member
 
Join Date: Dec 2002
Posts: 1
Default Tools

can be fabricated from the blade of a large steel drywall knife with a dremel tool. Get a set of jeweler's files too.

--nb
Reply With Quote
  #12  
Old 12-16-2002, 01:32 PM
Rens Rens is offline
Junior Member
 
Join Date: Dec 2002
Posts: 2
Default

Very nice topic

I picked my first lock today using 2 hammered down nails.
Here's a pic of the lock and the 2 nails

This is probably the easiest lock to pick in the world. Time for a new challenge
Reply With Quote
  #13  
Old 12-16-2002, 07:24 PM
muaddib muaddib is offline
Administrator
 
Join Date: Dec 2002
Location: Western USA
Posts: 29
Default

I like the hammered down nails. That's a great idea for anyone who can't find something flat like street sweeper bristles (hint hint kw :)
__________________
-mjuad
muaddib at reteam dot org
Reply With Quote
  #14  
Old 12-19-2002, 02:36 PM
kw kw is offline
Administrator
 
Join Date: Dec 2002
Location: The Netherlands
Posts: 116
Send a message via Yahoo to kw
Default

Hmm, looks good. Which is which? I assume the pick on the left is used for pressure, and the other one for picking?
If so, wouldn't you need some kind of small edge to push down an individual pin? Or can you just push all the pins down and see which one clicks with a flat surface like that?

-KW-
Reply With Quote
  #15  
Old 12-19-2002, 07:39 PM
Rens Rens is offline
Junior Member
 
Join Date: Dec 2002
Posts: 2
Default

Yeah, I use the left one for pressure. The right one is bended real lightly, just enough for this simple lock.
For the other lock I tried I needed different nails because these one were too short and a bit too wide.
Reply With Quote
  #16  
Old 01-26-2003, 06:36 PM
LiB LiB is offline
Junior Member
 
Join Date: Jan 2003
Posts: 1
Default materials

although i see i'm a bit outdated, i feel i should reply
i'm really happy that this topic appeared here, coz until
now i wasn't sure if the other crackers have similar interests
as me...now something to topic:
you discussed materials usable for creating of picks.
so called brush bristels are the best, i prefer them to anything else, but
if you cannot get them, there are also another suitable things
at first, hacksaw blades - you can ge them in regular store, it's really
good material(hard,maybee too much), but requires more filing to create a tool
second one: brick tape(the thing binding bricks for building together)-not so good, too thin and soft,but usable
+ i also have some tools made of (NINE INCH) nail , 1mm wire, paper clip, cork w/ nails etc.

there are also completely different methods of opening locks and also completely different locks
and i'd be really glad to share my knowledge with anyone interested
*L
Reply With Quote
  #17  
Old 01-26-2003, 09:03 PM
mrboggles mrboggles is offline
Junior Member
 
Join Date: Jan 2003
Posts: 3
Default Master Keys

Hey guys,

You have all probably seen this article already, but I thought I would post it anyway just in case. It doesn't really have anything to do with Lock Picking, but it talks about how to make a Master Key from a single lock and key from a building.

h**p://www.nytimes.com/2003/01/23/business/23LOCK.html

I thought it was pretty interesting how he applied his understanding of computer security to a real life target.

Regards,
mrboggles
Reply With Quote
  #18  
Old 01-27-2003, 03:46 PM
kw kw is offline
Administrator
 
Join Date: Dec 2002
Location: The Netherlands
Posts: 116
Send a message via Yahoo to kw
Default

It appears to want me to register first ;(

-kw-
__________________
"It's people like this that make you realize how little you've accomplished. It is a sobering thought, for instance, that when Mozart was my age, he had been dead for two years." - Tom Lehrer
Reply With Quote
  #19  
Old 01-27-2003, 04:10 PM
mrboggles mrboggles is offline
Junior Member
 
Join Date: Jan 2003
Posts: 3
Default

This will make it easier on everyone, heres the article.

<BEGIN_ARTICLE>
Master Key Copying Revealed
By JOHN SCHWARTZ


A security researcher has revealed a little-known vulnerability in many locks that lets a person create a copy of the master key for an entire building by starting with any key from that building.

The researcher, Matt Blaze of AT&T Labs-Research, found the vulnerability by applying his area of expertise the security flaws that allow hackers to break into computer networks to the real-world locks and keys that have been used for more than a century in office buildings, college campuses and some residential complexes.

The attack described by Mr. Blaze, which is known by some locksmiths, leaves no evidence of tampering. It can be used without resorting to removing the lock and taking it apart or other suspicious behavior that can give away ordinary lock pickers.

All that is needed, Mr. Blaze wrote, is access to a key and to the lock that it opens, as well as a small number of uncut key blanks and a tool to cut them to the proper shape. No special skills or tools are required; key-cutting machines costing hundreds of dollars apiece make the task easier, but the same results can be achieved with a simple metal file.

After testing the technique repeatedly against the hardware from major lock companies, Mr. Blaze wrote, "it required only a few minutes to carry out, even when using a file to cut the keys."

AT&T decided that the risk of abuse of the information was great, so it has taken the unusual step of posting an alert to law enforcement agencies nationwide. The alert describes the technique and the possible defenses against it, though the company warns that no simple solution exists.

The paper, which Mr. Blaze has submitted for publication in a computer security journal, has troubled security experts who have seen it. Marc Weber Tobias, a locks expert who works as a security consultant to law enforcement agencies, said he was rewriting his police guide to locks and lock-picking because of the paper. He said the technique could open doors worldwide for criminals and terrorists. "I view the problem as pretty serious," he said, adding that the technique was so simple, "an idiot could do it."

The technique is not news to locksmiths, said Lloyd Seliber, the head instructor of master-key classes for Schlage, a lock company that is part of Ingersoll-Rand. He said he even taught the technique, which he calls decoding, in his training program for locksmiths.

"This has been true for 150 years," Mr. Seliber said.

Variations on the decoding technique have also been mentioned in passing in locksmith trade journals, but usually as a way for locksmiths to replace a lost master key and not as a security risk.

When told that Mr. Seliber taught the technique to his students, Mr. Tobias said: "He may teach it, but it's new in the security industry. Security managers don't know about it."

In the paper, Mr. Blaze applies the principles of cryptanalysis, ordinarily used to break secret codes, to the analysis of mechanical lock designs. He describes a logical, deductive approach to learning the shape of a master key by building on clues provided by the key in hand an approach that cryptanalysts call an oracle attack. The technique narrows the number of tries that would be necessary to discover a master-key configuration to only dozens of attempts, not the thousands of blind tries that would otherwise be necessary.

The research paper might seem an odd choice of topics for a computer scientist, but Mr. Blaze noted that in his role as a security researcher for AT&T Labs, he examined issues that went to the heart of business security wherever they arose, whether in the digital world or the world of steel and brass.

Since publishing Mr. Blaze's technique could lead to an increase in thefts and other crimes, it presented an ethical quandary for him and for AT&T Labs the kind of quandary that must also be confronted whenever new security holes are discovered in computing.

"There's no way to warn the good guys without also alerting the bad guys," Mr. Blaze said. "If there were, then it would be much simpler we would just tell the good guys."

Publishing a paper about vulnerable locks, however, presented greater challenges than a paper on computer flaws.

The Internet makes getting the word out to those who manage computer networks easy, and fixing a computer vulnerability is often as simple as downloading a software patch. Getting word out to the larger, more amorphous world of security officers and locksmiths is a more daunting task, and for the most part, locks must be changed mechanically, one by one.

But Mr. Blaze said the issue of whether to release information about a serious vulnerability almost inevitably came down to a decision in favor of publication.

"The real problem is there's no way of knowing whether the bad guys know about an attack," he said, so publication "puts the good guys and the bad guys on equal footing."

In this case, the information appears to have made its way already to the computer underground. The AT&T alert to law enforcement officials said that a prepublication version of the paper distributed privately by Mr. Blaze for review last fall had been leaked onto the Internet, though it has not been widely circulated.

"At this point we believe that it is no longer possible to keep the vulnerability secret and that more good than harm would now be done by warning the wider community," the company wrote.

There is evidence that others have chanced upon other versions of the technique over the years. Though it does not appear in resources like "The M.I.T. Guide to Lockpicking," a popular text available on the Internet, Mr. Blaze said, "several of the people I've described this to over the past few months brightened up and said they had come on part of this to make a master key to their college dorm."

Mr. Blaze acknowledged that he was only the first to publish a detailed look at the security flaw and the technique for exploiting it.

"I don't think I'm the first person to discover this attack, but I do think I'm the first person to work out all the details and write it down," he said. "Burglars are interested in committing burglary, not in publishing results or warning people."

Mr. Tobias, the author of "Locks, Safes and Security: An International Police Reference," said that the technique was most likely to be used by an insider someone with ready access to a key and a lock. But it could also be used, he said, by an outsider who simply went into a building and borrowed the key to a restroom.

He said he had tested Mr. Blaze's technique the way that he tests many of the techniques described in his book: he gave instructions and materials to a 15-year-old in his South Dakota town to try out. The teenager successfully made a master key.

In the alert, AT&T warned, "Unfortunately, at this time there is no simple or completely effective countermeasure that prevents exploitation of this vulnerability, short of replacing a master-keyed system with a nonmastered one."

The letter added, "Residential facilities and safety-critical or high-value environments are strongly urged to consider whether the risks of master keying outweigh the convenience benefits in light of this new vulnerability."

Other defenses could make it harder to create master keys.

Mr. Blaze said that owners of master-key systems could move to the less popular master-ring system, which allows a master key to operate the tumblers in a way that is not related to the individual keys. But that system has problems of its own, security experts say.

Mr. Blaze suggested that creating a fake master key could also be made more difficult by using locks for which key blanks are difficult to get, though even those blanks can be bought in many hardware stores and through the Internet.

But few institutions want to spend the money for robust security, said Mr. Seliber of Schlage. His company recommends to architects and builders that they take steps like those recommended by Mr. Blaze, measures that make it more difficult to cut extra keys like using systems that are protected by patents because their key blanks are somewhat harder to buy, Mr. Seliber said. Even though such measures would add only 1 to 2 percent to the cost of each door, builders were often told to take a cheaper route. He said that they were told, " `We're not worried about ninjas rappelling in from the roof stuff take it easy.' "

That is not news to Mr. Blaze, who said it was also a familiar refrain in the world of computer security. "As any computer security person knows," he said, "in a battle between convenience and security, convenience has a way of winning."
</END_ARTICLE>

I'd like to get my hands on his published paper. :wink:

Regards,
mrboggles
Reply With Quote
  #20  
Old 01-28-2003, 10:34 AM
kw kw is offline
Administrator
 
Join Date: Dec 2002
Location: The Netherlands
Posts: 116
Send a message via Yahoo to kw
Default

Quote:

I'd like to get my hands on his published paper. *:wink:
I figured I would as well, so I threw the guy's name into google. It turned up http://www.crypto.com/ as first hit. It turns out to be the guy's own website, which has the masterkey publication on it. I downloaded it already, will read it tonight. It looks good, nice illustrations etcetera.
Enjoy

-kw
__________________
"It's people like this that make you realize how little you've accomplished. It is a sobering thought, for instance, that when Mozart was my age, he had been dead for two years." - Tom Lehrer
Reply With Quote
Reply


Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump





Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2019, Jelsoft Enterprises Ltd.