SlideShare a Scribd company logo
1 of 8
Introduction to the Art of Picking
Locks
Vilnius - 17/05/2013
Introduction
“Lock picking is the art of unlocking a lock by
analyzing and manipulating the components
of the lock device, without the original key.”
Wikipedia
2
Pin Tumbler Lock’s Anatomy
3
Shell: contains all of the internal
components.
Plug: is the active and rotating component
of the pin tumbler lock.
Keyway: limits the number of keys that can
enter the lock.
Key: is the device used to unlock the lock.
Pins: also called tumblers. Provides the
security locking mechanism.
Springs: force each tumbler-set into the
plug and maintain the integrity of the pin-
stack while the key is inserted and
removed.
Shear line: is the level to which all pins
must be raised in order for the plug to
rotate.
How a Lock works
4
Shear line
Lockpicking Tools
5
How to Pick a Lock
6
4 1 5 3 2
Plug
1)  Apply torque in the same direction that you would
turn the key
2)  Use the pick to push up the pins
3)  Since most locks are not built absolutely perfect…
4)  The goal here is to press each pair of pins until you
hear a “click”.
Security Pins
7
Spool Mushroom
Serrated
Bibliography
8
http://www.gregmiller.net/locks/mitguide/
http://www.lockwiki.com/
http://www.ssdev.org/SSDeV/start.php

More Related Content

Similar to Lockpicking Baltic Cyber Security Forum 2013

Protective locks and key control
Protective locks and key controlProtective locks and key control
Protective locks and key control
Eman Calva
 
lawenforcementadministrationii-140112075537-phpapp02.pptx
lawenforcementadministrationii-140112075537-phpapp02.pptxlawenforcementadministrationii-140112075537-phpapp02.pptx
lawenforcementadministrationii-140112075537-phpapp02.pptx
ArhakirAlpapara
 
[Illegal] improvised lock picks
[Illegal] improvised lock picks[Illegal] improvised lock picks
[Illegal] improvised lock picks
Sah Ya
 

Similar to Lockpicking Baltic Cyber Security Forum 2013 (8)

Locksmithing
LocksmithingLocksmithing
Locksmithing
 
TYPES OF LOCKS.pdf
TYPES OF LOCKS.pdfTYPES OF LOCKS.pdf
TYPES OF LOCKS.pdf
 
Protective locks and key control
Protective locks and key controlProtective locks and key control
Protective locks and key control
 
FINGERPRINT DOORLOCK USING ARDUINO UNO _
FINGERPRINT DOORLOCK USING ARDUINO UNO _FINGERPRINT DOORLOCK USING ARDUINO UNO _
FINGERPRINT DOORLOCK USING ARDUINO UNO _
 
Chubb lock replacement.pptx
Chubb lock replacement.pptxChubb lock replacement.pptx
Chubb lock replacement.pptx
 
lawenforcementadministrationii-140112075537-phpapp02.pptx
lawenforcementadministrationii-140112075537-phpapp02.pptxlawenforcementadministrationii-140112075537-phpapp02.pptx
lawenforcementadministrationii-140112075537-phpapp02.pptx
 
[Illegal] improvised lock picks
[Illegal] improvised lock picks[Illegal] improvised lock picks
[Illegal] improvised lock picks
 
Paxton Access 746-284-US Instruction Manual
Paxton Access 746-284-US Instruction ManualPaxton Access 746-284-US Instruction Manual
Paxton Access 746-284-US Instruction Manual
 

More from Luca Bongiorni

Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...
Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...
Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...
Luca Bongiorni
 

More from Luca Bongiorni (6)

HandPwning Security pitfalls of biometric hand-geometry recognition access co...
HandPwning Security pitfalls of biometric hand-geometry recognition access co...HandPwning Security pitfalls of biometric hand-geometry recognition access co...
HandPwning Security pitfalls of biometric hand-geometry recognition access co...
 
ANP catalog: the adversarial ninja playset
ANP catalog: the adversarial ninja playsetANP catalog: the adversarial ninja playset
ANP catalog: the adversarial ninja playset
 
Manufacturing Hardware Implants from Idea to Mass Production: A Hacker's Journey
Manufacturing Hardware Implants from Idea to Mass Production: A Hacker's JourneyManufacturing Hardware Implants from Idea to Mass Production: A Hacker's Journey
Manufacturing Hardware Implants from Idea to Mass Production: A Hacker's Journey
 
How to bring HID attacks to next level with WHID Injector & P4wnP1
How to bring HID attacks to next level with WHID Injector & P4wnP1How to bring HID attacks to next level with WHID Injector & P4wnP1
How to bring HID attacks to next level with WHID Injector & P4wnP1
 
Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...
Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...
Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...
 
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil ProtectionOpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Lockpicking Baltic Cyber Security Forum 2013