top of page

Mini Dragon Group (ages 6-7)

Public·12 members
Robert Howard
Robert Howard

Practical Lock Picking: A Physical Penetration ...



For the first time, Deviant Ollam, one of the security industry's best-known lockpicking teachers, has assembled an instructional manual geared specifically toward penetration testers. Unlike other texts on the subject (which tend to be either massive volumes detailing every conceivable style of lock or brief "spy manuals" that only skim the surface) this book is for INFOSEC professionals that need essential, core knowledge of lockpicking and seek the ability to open most locks with relative ease. Deviant's material is presented with rich, detailed diagrams and is offered in easy-to-follow lessons which allow even beginners to acquire the knowledge very quickly. Everything from straightforward lockpicking to quick-entry techniques like shimming, bumping, and bypassing is explained and shown.Whether you're being hired to penetrate security or simply trying to harden your own defenses, this book is essential.




Practical Lock Picking: A Physical Penetration ...



Perry's guests are Alethe Denis (social engineer and DefCon 2019 Social Engineering CTF winner), Deviant Ollam (penetration tester, lock picking guru, and Board Member of The Open Organization of Lockpickers), Chris Kirsch (Co-Founder and CEO of Rumble, DefCon 2017 Social Engineering CTF winner) , and Gerald Auger (Founder of Simply Cyber, Director of Cybersecurity Education & Cybersecurity Program Manager at ThreatGEN).


How important is physical security to your overall security posture? Should security people really know how to pick locks and hack elevators? Join the SEORG Podcast panel with our guest Deviant Ollam to discuss these very important topics. March 09, 2015


Lock picking has always been part of the hacker scene, you can find lock picking villages at lots of infosec conferences and it is a popular hobby with hackers because picking locks is the physical version of penetration testing. Many professional penetration testers are also skilled lock pickers because breaking into their employers buildings, secure areas and restricted locations is often in their job description.


The disciplines of physical penetration testing and infosec penetration testing complement each other beautifully because one is an extension of the other. Before we had encryption, 2FA and biometric authentication to protect our data, we used physical door locks and padlocks to secure our valuables and data. We still do in fact.


I was actually quite surprised to hear from Jek that she didn't use her lock picking skills in her job more unless she was opening filing cabinets or paper shredders. Jek conducts physical penetration tests against facilities and buildings, so she knows what she is talking about when it comes to breaking into buildings, she told me:


At the Great Exhibition of 1851, the American locksmith Alfred Charles Hobbs was able to open the lock and was awarded the prize. He took 51 hours, spread over 16 days to open the lock. Hobbs was an early physical penetration specialist who had made a name for himself in the United States by showing bank managers how he could easily pick their locks in order to sell them one of his own locks. After Hobbs had successfully picked the Bramah lock and the Chubb detector lock, that feeling of perfect security never really came back, but it did force locksmiths to innovate their lock designs in order to restore some semblance of security in the eyes of the public who were notably shocked at the time that 'perfect security' no longer existed.


Lock picking is a fantastic hobby that I would recommend to anyone, its easy to start, cheap to buy the things you need and learn. Being able to open locks also gives you a sense of power, it feels good to be able to look at a lock and know you can pick it open, so there are two rules we follow in lock picking. Rule number one is never pick a lock that you don't own or do not have permission to pick and rule number two is do not pick locks that you rely on or that are in use. These pretty much mimic the rules we tell young hackers in infosec as they go out into the world on Shodan safari's to practice their penetration testing skills. Have fun, but don't break the law! 041b061a72


About

Welcome to the group! You can connect with other members, ge...

Members