SlideShare a Scribd company logo
1 of 8
Introduction to the Art of Picking
Locks
Vilnius - 17/05/2013
Introduction
“Lock picking is the art of unlocking a lock by
analyzing and manipulating the components
of the lock device, without the original key.”
Wikipedia
2
Pin Tumbler Lock’s Anatomy
3
Shell: contains all of the internal
components.
Plug: is the active and rotating component
of the pin tumbler lock.
Keyway: limits the number of keys that can
enter the lock.
Key: is the device used to unlock the lock.
Pins: also called tumblers. Provides the
security locking mechanism.
Springs: force each tumbler-set into the
plug and maintain the integrity of the pin-
stack while the key is inserted and
removed.
Shear line: is the level to which all pins
must be raised in order for the plug to
rotate.
How a Lock works
4
Shear line
Lockpicking Tools
5
How to Pick a Lock
6
4 1 5 3 2
Plug
1)  Apply torque in the same direction that you would
turn the key
2)  Use the pick to push up the pins
3)  Since most locks are not built absolutely perfect…
4)  The goal here is to press each pair of pins until you
hear a “click”.
Security Pins
7
Spool Mushroom
Serrated
Bibliography
8
http://www.gregmiller.net/locks/mitguide/
http://www.lockwiki.com/
http://www.ssdev.org/SSDeV/start.php

More Related Content

Similar to Lockpicking Baltic Cyber Security Forum 2013

Protective locks and key control
Protective locks and key controlProtective locks and key control
Protective locks and key control
Eman Calva
 
lawenforcementadministrationii-140112075537-phpapp02.pptx
lawenforcementadministrationii-140112075537-phpapp02.pptxlawenforcementadministrationii-140112075537-phpapp02.pptx
lawenforcementadministrationii-140112075537-phpapp02.pptx
ArhakirAlpapara
 
[Illegal] improvised lock picks
[Illegal] improvised lock picks[Illegal] improvised lock picks
[Illegal] improvised lock picks
Sah Ya
 

Similar to Lockpicking Baltic Cyber Security Forum 2013 (8)

Locksmithing
LocksmithingLocksmithing
Locksmithing
 
TYPES OF LOCKS.pdf
TYPES OF LOCKS.pdfTYPES OF LOCKS.pdf
TYPES OF LOCKS.pdf
 
Protective locks and key control
Protective locks and key controlProtective locks and key control
Protective locks and key control
 
FINGERPRINT DOORLOCK USING ARDUINO UNO _
FINGERPRINT DOORLOCK USING ARDUINO UNO _FINGERPRINT DOORLOCK USING ARDUINO UNO _
FINGERPRINT DOORLOCK USING ARDUINO UNO _
 
Chubb lock replacement.pptx
Chubb lock replacement.pptxChubb lock replacement.pptx
Chubb lock replacement.pptx
 
lawenforcementadministrationii-140112075537-phpapp02.pptx
lawenforcementadministrationii-140112075537-phpapp02.pptxlawenforcementadministrationii-140112075537-phpapp02.pptx
lawenforcementadministrationii-140112075537-phpapp02.pptx
 
[Illegal] improvised lock picks
[Illegal] improvised lock picks[Illegal] improvised lock picks
[Illegal] improvised lock picks
 
Paxton Access 746-284-US Instruction Manual
Paxton Access 746-284-US Instruction ManualPaxton Access 746-284-US Instruction Manual
Paxton Access 746-284-US Instruction Manual
 

More from Luca Bongiorni

Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...
Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...
Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...
Luca Bongiorni
 

More from Luca Bongiorni (6)

HandPwning Security pitfalls of biometric hand-geometry recognition access co...
HandPwning Security pitfalls of biometric hand-geometry recognition access co...HandPwning Security pitfalls of biometric hand-geometry recognition access co...
HandPwning Security pitfalls of biometric hand-geometry recognition access co...
 
ANP catalog: the adversarial ninja playset
ANP catalog: the adversarial ninja playsetANP catalog: the adversarial ninja playset
ANP catalog: the adversarial ninja playset
 
Manufacturing Hardware Implants from Idea to Mass Production: A Hacker's Journey
Manufacturing Hardware Implants from Idea to Mass Production: A Hacker's JourneyManufacturing Hardware Implants from Idea to Mass Production: A Hacker's Journey
Manufacturing Hardware Implants from Idea to Mass Production: A Hacker's Journey
 
How to bring HID attacks to next level with WHID Injector & P4wnP1
How to bring HID attacks to next level with WHID Injector & P4wnP1How to bring HID attacks to next level with WHID Injector & P4wnP1
How to bring HID attacks to next level with WHID Injector & P4wnP1
 
Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...
Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...
Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...
 
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil ProtectionOpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Lockpicking Baltic Cyber Security Forum 2013