forensic forensic locksmithing locksmithing
play

Forensic Forensic Locksmithing Locksmithing HES 2015 Alexandre - PowerPoint PPT Presentation

Forensic Forensic Locksmithing Locksmithing HES 2015 Alexandre TRIFFAULT @FrenchKey_fr alexandre@ouverturefine.com www frenchkeyfr www.frenchkey.fr www.serrurerieforensique.fr Alexandre TRIFFAULT // @FrenchKey_FR //


  1. Forensic Forensic Locksmithing Locksmithing HES 2015 Alexandre TRIFFAULT @FrenchKey_fr alexandre@ouverturefine.com www frenchkeyfr www.frenchkey.fr www.serrurerieforensique.fr Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  2. Who Who Who ? Who ? Alexandre Triffault Alexandre Triffault My hobbies : • Collecting Locks, T Collecting Locks, T ools and ools and • Opening techniques RF and RFID R&D • My Company : OFC • (Outillage Formation Conseil) www.ouverture-fine.com Websites I run : • www.frenchkey.fr • www.serrurerieforensique.fr • www.locksport.fr • Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  3. Introduction Introduction Introduction Introduction  Why physical security matters ?  Why would anyone use NDE techniques ? Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  4. Plan Plan Plan Plan  How a key works  How a key works  NDE techniques and how they act  Forensic analysis of such techniques  Anti forensic  Anti-forensic  Countermeasures Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  5. How a How a key How a How a key key works key works works works Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  6. How a How a key How a How a key key works key works works works All pins must be aligned so the lock can be opened the lock can be opened Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  7. NDE techniques and how NDE techniques and how they NDE techniques and how NDE techniques and how they they act they act act act Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  8. Basic Basic Lockpicking Basic Basic Lockpicking Lockpicking Lockpicking Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  9. Bumping Bumping Bumping Bumping Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  10. Mechanical Mechanical pick Mechanical Mechanical pick pick gun pick-gun gun gun Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  11. Electro Electro pick Electro Electro pick pick gun pick-gun gun gun Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  12. Impressioning Impressioning Impressioning Impressioning video video Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  13. Forensic Forensic Analysis Forensic Forensic Analysis Analysis Analysis Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  14. Forensic Forensic Analysis Analysis  Know the target Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  15. Forensic Forensic Analysis Analysis y  Know the target ◦ Forums :  Locksport.fr p  Lockpicking101.com ◦ Books :  Locks Safes and Security L k S f d S it  High Security Mechanical Locks Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  16. Practical Practical Forensic Forensic Analysis Analysis y Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  17. Anti Anti Forensic Anti Anti Forensic Forensic Techniques Forensic Techniques Techniques Techniques  Key duplication  Lock decoding  Lock recoding  Lock recoding Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  18. Key duplication Key duplication with Key duplication Key duplication with with trade with trade trade machines trade machines machines machines video Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  19. Key duplication by Key duplication by Molding Key duplication by Key duplication by Molding Molding Molding Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  20. Key duplication by hand Key duplication by hand Key duplication by hand Key duplication by hand Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  21. Key duplication Key duplication with Key duplication Key duplication with with 3D printing with 3D printing 3D printing 3D printing Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  22. Lock Lock decoding Lock Lock decoding decoding decoding  Key duplicating from a picture  Key duplicating from a picture  Soft manipulation (Safe locks mostly)  X-Rays, IR and Doppler attacks  Right amplification in a Masterkeyed  Right amplification in a Masterkeyed system Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  23. Lock Lock recoding Lock Lock recoding recoding recoding  Very basic attack :  Very basic attack : ◦ Break the lock ◦ Take it apart ◦ Build a new one with the same combination  (and make a working key in the meantime)  It leaves no regular forensic clue, which is a clue by itself somehow Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  24. Countermeasures Countermeasures Countermeasures Countermeasures  Key duplication can leave traces too  Key duplication can leave traces too Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  25. Countermeasures Countermeasures Countermeasures Countermeasures  Key duplication can leave traces too  Key duplication can leave traces too Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  26. Countermeasures Countermeasures Countermeasures Countermeasures  Key duplication can leave traces too  Key duplication can leave traces too Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  27. Countermeasures Countermeasures Countermeasures Countermeasures  Use hard to duplicate/replicate keys  Use hard to duplicate/replicate keys  Know your material and its flaws  Hide your keys ! Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  28. Conclusion Conclusion Conclusion Conclusion Do forensic when you have a data leak, you could find surprinsing stuff about how you could find surprinsing stuff about how that leak occured Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  29. Questions, suggestions ? Questions, suggestions ? Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

  30. Thank ThankYou ! Thank ThankYou ! You ! You ! Alexandre TRIFFAULT // @FrenchKey_FR // Alexandre@ouverture-fine.com // www.frenchkey.fr

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend