SlideShare a Scribd company logo
1 of 8
Introduction to the Art of Picking
Locks
Vilnius - 17/05/2013
Introduction
“Lock picking is the art of unlocking a lock by
analyzing and manipulating the components
of the lock device, without the original key.”
Wikipedia
2
Pin Tumbler Lock’s Anatomy
3
Shell: contains all of the internal
components.
Plug: is the active and rotating component
of the pin tumbler lock.
Keyway: limits the number of keys that can
enter the lock.
Key: is the device used to unlock the lock.
Pins: also called tumblers. Provides the
security locking mechanism.
Springs: force each tumbler-set into the
plug and maintain the integrity of the pin-
stack while the key is inserted and
removed.
Shear line: is the level to which all pins
must be raised in order for the plug to
rotate.
How a Lock works
4
Shear line
Lockpicking Tools
5
How to Pick a Lock
6
4 1 5 3 2
Plug
1)  Apply torque in the same direction that you would
turn the key
2)  Use the pick to push up the pins
3)  Since most locks are not built absolutely perfect…
4)  The goal here is to press each pair of pins until you
hear a “click”.
Security Pins
7
Spool Mushroom
Serrated
Bibliography
8
http://www.gregmiller.net/locks/mitguide/
http://www.lockwiki.com/
http://www.ssdev.org/SSDeV/start.php

More Related Content

Similar to Lockpicking Baltic Cyber Security Forum 2013

Protective locks and key control
Protective locks and key controlProtective locks and key control
Protective locks and key control
Eman Calva
 
lawenforcementadministrationii-140112075537-phpapp02.pptx
lawenforcementadministrationii-140112075537-phpapp02.pptxlawenforcementadministrationii-140112075537-phpapp02.pptx
lawenforcementadministrationii-140112075537-phpapp02.pptx
ArhakirAlpapara
 
[Illegal] improvised lock picks
[Illegal] improvised lock picks[Illegal] improvised lock picks
[Illegal] improvised lock picks
Sah Ya
 

Similar to Lockpicking Baltic Cyber Security Forum 2013 (8)

Locksmithing
LocksmithingLocksmithing
Locksmithing
 
TYPES OF LOCKS.pdf
TYPES OF LOCKS.pdfTYPES OF LOCKS.pdf
TYPES OF LOCKS.pdf
 
Protective locks and key control
Protective locks and key controlProtective locks and key control
Protective locks and key control
 
FINGERPRINT DOORLOCK USING ARDUINO UNO _
FINGERPRINT DOORLOCK USING ARDUINO UNO _FINGERPRINT DOORLOCK USING ARDUINO UNO _
FINGERPRINT DOORLOCK USING ARDUINO UNO _
 
Chubb lock replacement.pptx
Chubb lock replacement.pptxChubb lock replacement.pptx
Chubb lock replacement.pptx
 
lawenforcementadministrationii-140112075537-phpapp02.pptx
lawenforcementadministrationii-140112075537-phpapp02.pptxlawenforcementadministrationii-140112075537-phpapp02.pptx
lawenforcementadministrationii-140112075537-phpapp02.pptx
 
[Illegal] improvised lock picks
[Illegal] improvised lock picks[Illegal] improvised lock picks
[Illegal] improvised lock picks
 
Paxton Access 746-284-US Instruction Manual
Paxton Access 746-284-US Instruction ManualPaxton Access 746-284-US Instruction Manual
Paxton Access 746-284-US Instruction Manual
 

More from Luca Bongiorni

Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...
Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...
Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...
Luca Bongiorni
 

More from Luca Bongiorni (6)

HandPwning Security pitfalls of biometric hand-geometry recognition access co...
HandPwning Security pitfalls of biometric hand-geometry recognition access co...HandPwning Security pitfalls of biometric hand-geometry recognition access co...
HandPwning Security pitfalls of biometric hand-geometry recognition access co...
 
ANP catalog: the adversarial ninja playset
ANP catalog: the adversarial ninja playsetANP catalog: the adversarial ninja playset
ANP catalog: the adversarial ninja playset
 
Manufacturing Hardware Implants from Idea to Mass Production: A Hacker's Journey
Manufacturing Hardware Implants from Idea to Mass Production: A Hacker's JourneyManufacturing Hardware Implants from Idea to Mass Production: A Hacker's Journey
Manufacturing Hardware Implants from Idea to Mass Production: A Hacker's Journey
 
How to bring HID attacks to next level with WHID Injector & P4wnP1
How to bring HID attacks to next level with WHID Injector & P4wnP1How to bring HID attacks to next level with WHID Injector & P4wnP1
How to bring HID attacks to next level with WHID Injector & P4wnP1
 
Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...
Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...
Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...
 
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil ProtectionOpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Lockpicking Baltic Cyber Security Forum 2013