forensic forensic locksmithing locksmithing
play

Forensic Forensic Locksmithing Locksmithing HES 2015 Alexandre - PowerPoint PPT Presentation

Forensic Forensic Locksmithing Locksmithing HES 2015 Alexandre TRIFFAULT @FrenchKey_fr alexandre@ouverturefine.com www frenchkeyfr www.frenchkey.fr www.serrurerieforensique.fr Alexandre TRIFFAULT // @FrenchKey_FR //


  1. Forensic Forensic Locksmithing Locksmithing HES 2015 Alexandre TRIFFAULT @FrenchKey_fr alexandre@ouverturefine.com www frenchkeyfr www.frenchkey.fr www.serrurerieforensique.fr Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  2. Who Who Who ? Who ? Alexandre Triffault Alexandre Triffault My hobbies : • Collecting Locks, T Collecting Locks, T ools and ools and • Opening techniques RF and RFID R&D • My Company : OFC • (Outillage Formation Conseil) www.ouverture-fine.com Websites I run : • www.frenchkey.fr • www.serrurerieforensique.fr • www.locksport.fr • Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  3. Introduction Introduction Introduction Introduction  Why physical security matters ?  Why would anyone use NDE techniques ? Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  4. Plan Plan Plan Plan  How a key works  How a key works  NDE techniques and how they act  Forensic analysis of such techniques  Anti forensic  Anti-forensic  Countermeasures Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  5. How a How a key How a How a key key works key works works works Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  6. How a How a key How a How a key key works key works works works All pins must be aligned so the lock can be opened the lock can be opened Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  7. NDE techniques and how NDE techniques and how they NDE techniques and how NDE techniques and how they they act they act act act Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  8. Basic Basic Lockpicking Basic Basic Lockpicking Lockpicking Lockpicking Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  9. Bumping Bumping Bumping Bumping Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  10. Mechanical Mechanical pick Mechanical Mechanical pick pick gun pick-gun gun gun Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  11. Electro Electro pick Electro Electro pick pick gun pick-gun gun gun Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  12. Impressioning Impressioning Impressioning Impressioning video video Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  13. Forensic Forensic Analysis Forensic Forensic Analysis Analysis Analysis Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  14. Forensic Forensic Analysis Analysis  Know the target Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  15. Forensic Forensic Analysis Analysis y  Know the target ◦ Forums :  Locksport.fr p  Lockpicking101.com ◦ Books :  Locks Safes and Security L k S f d S it  High Security Mechanical Locks Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  16. Practical Practical Forensic Forensic Analysis Analysis y Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  17. Anti Anti Forensic Anti Anti Forensic Forensic Techniques Forensic Techniques Techniques Techniques  Key duplication  Lock decoding  Lock recoding  Lock recoding Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  18. Key duplication Key duplication with Key duplication Key duplication with with trade with trade trade machines trade machines machines machines video Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  19. Key duplication by Key duplication by Molding Key duplication by Key duplication by Molding Molding Molding Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  20. Key duplication by hand Key duplication by hand Key duplication by hand Key duplication by hand Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  21. Key duplication Key duplication with Key duplication Key duplication with with 3D printing with 3D printing 3D printing 3D printing Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  22. Lock Lock decoding Lock Lock decoding decoding decoding  Key duplicating from a picture  Key duplicating from a picture  Soft manipulation (Safe locks mostly)  X-Rays, IR and Doppler attacks  Right amplification in a Masterkeyed  Right amplification in a Masterkeyed system Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  23. Lock Lock recoding Lock Lock recoding recoding recoding  Very basic attack :  Very basic attack : ◦ Break the lock ◦ Take it apart ◦ Build a new one with the same combination  (and make a working key in the meantime)  It leaves no regular forensic clue, which is a clue by itself somehow Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  24. Countermeasures Countermeasures Countermeasures Countermeasures  Key duplication can leave traces too  Key duplication can leave traces too Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  25. Countermeasures Countermeasures Countermeasures Countermeasures  Key duplication can leave traces too  Key duplication can leave traces too Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  26. Countermeasures Countermeasures Countermeasures Countermeasures  Key duplication can leave traces too  Key duplication can leave traces too Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  27. Countermeasures Countermeasures Countermeasures Countermeasures  Use hard to duplicate/replicate keys  Use hard to duplicate/replicate keys  Know your material and its flaws  Hide your keys ! Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  28. Conclusion Conclusion Conclusion Conclusion Do forensic when you have a data leak, you could find surprinsing stuff about how you could find surprinsing stuff about how that leak occured Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  29. Questions, suggestions ? Questions, suggestions ? Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  30. Thank ThankYou ! Thank ThankYou ! You ! You ! Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

Recommend


More recommend