Presented at
HOPE Number Nine (2012),
July 13, 2012, 7 p.m.
(60 minutes).
The world of locks is one in which, so very often, things old become new again. Master-keyed lock systems fall into this category. For years now, many people have shared advice and stories regarding methods of attacking master-keyed systems. This year, at HOPE Number Nine, The Open Organisation Of Lockpickers will be running a contest in which attendees may attempt to decode a master-keyed system during the weekend. If you stop by this presentation, you’ll be a few steps ahead of everyone else who is attempting this interesting and different lockpicking game at HOPE Number Nine - and you’ll learn about how master-keyed systems are often vulnerable to many surreptitious attacks.
Presenters:
-
Deviant Ollam
Deviant Ollam, while paying the bills as a security auditor and penetration testing consultant with his company (The CORE Group), is also a member of the board of directors of the U.S. branch of TOOOL, The Open Organisation Of Lockpickers. At events like DEFCON, ShmooCon, HOPE, and many other cons, Deviant runs the Lockpick Village, and he has conducted physical security training sessions at Black Hat, DeepSec, ToorCon, GovCERT, AusCERT, HackCon, ShakaCon, HackInTheBox, CanSecWest, ekoparty, and the United States Military Academy at West Point. His favorite Amendments to the U.S. Constitution are, in no particular order, the 1st, 2nd, 9th, and 10th
Links:
Tags:
Similar Presentations: