lockpicking forensics - def con® hacking conference · pdf filepicking a lock apply...

117
Lockpicking Forensics datagram [email protected] Defcon 17, 2009

Upload: lamdien

Post on 19-Mar-2018

217 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Lockpicking Forensics

[email protected]

Defcon 17, 2009

Page 2: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Agenda

How locks/picks work Normal wear Lock Analysis Key Analysis Investigative process

Page 3: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Destructive entry still #1!

Page 4: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

How Locks Work

Page 5: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

How Locks Work

Page 6: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

How Locks Work

Page 7: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

How Locks Work

Page 8: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Pin Binding

Page 9: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Pin Binding

Page 10: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Picking a Lock

Apply tensionFind binding pinRaise to shear lineRepeat

Page 11: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Picking a Lock

Page 12: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Forensic Locksmithing

1976 - Art Paholke, Chicago PD

Locks, Safes, Security (Tobias) Werkzeugspur (Goth) Impressioning (Diederichsen)

Determine method of entry Identify evidence, tool marks, techniques Provide expert testimony

Page 13: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Pins – New

Page 14: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Pins – New

Page 15: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Key - New

Page 16: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Plug - New

Page 17: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Pins – 100 uses

Page 18: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Pins – 100 uses

Page 19: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Plug – 100 uses

Page 20: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Key – 100 Uses

Page 21: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Pins – 1,500 uses (pin 1)

Page 22: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Pins – 1,500 uses (pin 5)

Page 23: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Key – 1,500 uses

Page 24: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Plug – 1,500 uses

Page 25: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Pins - 5,000 uses (pin 1)

Page 26: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Pins - 5,000 uses (pin 5)

Page 27: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Plug – 5,000 uses

Page 28: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Plug – 5,000 uses

Page 29: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Plug – 5,000 uses

Page 30: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Key - 5,000 uses

Page 31: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Forensic Analysis

Components (pins, springs, etc)PlugCylinderCam/ActuatorKeysBoltDoor, window, wall, etc

Page 32: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Lockpicking

Page 33: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Lockpicking - Pins

Page 34: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Lockpicking - Pins

Page 35: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Lockpicking - Pins

Page 36: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Lockpicking - Pins

Page 37: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Lockpicking - Pins

Page 38: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Lockpicking - Pins

Page 39: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Lockpicking - Pins

Page 40: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Lockpicking - Pins

Page 41: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Lockpicking - Pins

Page 42: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Lockpicking - Pins

Page 43: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Lockpicking - Pins

Page 44: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Lockpicking - Plug

Page 45: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Lockpicking - Plug

Page 46: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Lockpicking - Plug

Page 47: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Lockpicking - Plug

Page 48: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Lockpicking - Plug

Page 49: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Lockpicking - Plug

Page 50: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Lockpicking - Tension

Page 51: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Lockpicking - Tension

Page 52: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Lockpicking - Tension

Page 53: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Lockpicking - Cam

Page 54: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Lockpicking - Cam

Page 55: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Lockpicking - Medecoder

Page 56: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Pick Guns

Page 57: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Pick Guns - Pins

Page 58: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Pick Guns - Pins

Page 59: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Pick Guns - Cam

Page 60: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Pick Guns - Cam

Page 61: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Key Bumping

Page 62: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Key Bumping

Page 63: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Key Bumping - Pins

Page 64: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Key Bumping - Pins

Page 65: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Key Bumping - Pins

Page 66: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Key Bumping - Pins

Page 67: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Key Bumping - Pins

Page 68: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Key Bumping - Pins

Page 69: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Key Bumping - Plug

Page 70: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Key Bumping - Face

Page 71: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Key Bumping - Face

Page 72: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Key Bumping - Plug

Page 73: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Impressioning

Page 74: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Impressioning - Manipulation

Page 75: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Impressioning - Manipulation

Page 76: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Impressioning - Plug

Page 77: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Impressioning – UV residue

Page 78: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Impressioning – UV Residue

Page 79: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Decoding

Depends on technique Covert vs. surreptitious

Decoder “pick” Manipulation Visual/Optical Thermal Radiological Disassembly

Page 80: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Decoding - Visual

Page 81: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Decoding - Visual

Page 82: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Bypass

Page 83: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Bypass

Page 84: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Bypass

Page 85: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Key Analysis

Material, keyway, cuts, codes

Original or duplicate Hand cut or machined Recent cutting, copying

Material transfer

Page 86: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Keys - Plating

Page 87: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Keys – Original vs Copied

Page 88: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Keys – Original vs Copied

Page 89: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Keys – Stylus striae

Page 90: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Keys – Hand made

Page 91: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Keys – Filed

Page 92: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Keys – Filed

Page 93: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Keys - Dremel

Page 94: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Keys – Cutting Wheels

Page 95: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Keys - Comparison

Page 96: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Key - Bumping

Page 97: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Keys – Bumping

Page 98: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Keys – Tool Marks

Page 99: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Keys – Tool Marks

Page 100: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Keys – Tool Marks

Page 101: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Keys – Clay residue

Page 102: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Keys – Wax residue

Page 103: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Keys – UV Residue

Page 104: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Anti-forensics Tools?

Possible!

Difficult to use Limited durability Expensive*

Page 105: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Safe/Vault Forensics

Drill points Writing/marking Magnetic/adhesive Tool marks

Page 106: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Investigative Process

Crime scene investigation Laboratory examination Investigative report Testimony

Page 107: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Crime Scene Investigation

Photographs Sketches Permission issues Evidence preservation Chain of custody

Police vs. Insurance

Page 108: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Initial Questions

Purchase/Installation Per day usage Security rating(s) Key/combo distribution Lock condition

− Working?− Repaired?− Replaced?

Page 109: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Forensic Examination

Lock specs & data Lock operation Lock security rating Tool marks Material transfer Keys

Do your homework!

Page 110: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Disassembly

Chamber casings

Use of key(s)

Shimming

Destructive

Page 111: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Shimming

Page 112: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Forensic Workspaces Separate!

Clean area

Clean/new tools− Tweezers, followers, shims− Saws− Clay− Hands/etc

Page 113: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Cleaning of Components

To clean or not?

Always look first!

Evidence destruction False evidence creation

Page 114: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Cleaning of Components

Page 115: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Investigative Report

Findings Supporting pictures Mirrored locks*

− Picked− Pick gun− Bumped− Impressioned

Page 116: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Licensing & Certification

International Association of Investigative Locksmiths (IAIL)

Page 117: Lockpicking Forensics - DEF CON® Hacking Conference · PDF filePicking a Lock Apply tension Find binding pin Raise to shear line Repeat

Resources

http://www.LockpickingForensics.com

http://www.LockpickingForensics.com/links.php

http://www.LockWiki.com