Metadata - I have an action item for my yearly review to propose a major change to any of our systems. That should be easy. I want to make my proposal beneficial to ...
If you do have access to some blanks, you can try a couple times to get through. The key (no pun) is to cut one key depth at a time. You might be able to create a key that works on multiple locks. You produce a master, then you become the master. Sounds like Star Wars, right?
The key itself is hollowed out. There is an angle that shines up into the lock mechanism. You can take pictures of what you see in the key. There are six possible depths you need to measure. This works on Schlage locks, even the secure ones.
This is a subset of what's known as impressioning. Like with rake keys, you start with a key blank. Then you use the lock itself to get information on how to modify the key to fit. You will need a file to carve the key. You will also need a magnifier to spy on the lock you are trying to bypass.
You should have a couple of key blanks if you are trying this technique. You should also have something to hold the key steady like vice grips. You put the blank in the lock and turn it. The marks on the key indicate how you should cut it.
You can color the key with a sharpie to see where the lock interacts with the key. Or your could use ultraviolet rays to do the trick. The goal is to produce a real key that works in the lock.
Next up we have the New York City metro transit authority. They use Yale locks throughout their travel systems. Those locks have been hacked. In fact, you can pick up a master key on the black market for about $50.
A prominent reporter bought an NYC MTA master key to use for a story he was writing. Ooops. The reported showed a picture of himself and his key. Now you average Joe does not even have to shell out the fifty bucks to bypass the MTA security.
You can make an impression of an existing key very quickly. Talking about a few minutes here. This works for all but high security locks. Put the working key in some putty. Makes a three dimensional impression. Let it harden and you are good to go for cutting a copy.
So if you lose access to your keys for even a short time, you are as good as owned. This is true even for secure locks. And you just don't have to lose physical possession of your key. Someone can take a picture of the key and clone it. Experts can just look at your key and figure out how to replicate it.
If you are trying to dup a key, you should try a couple different combinations. One of them is bound to work if you have a little skill. You can take advantage of the possible layouts of keys.
If you cannot take possession of a key, you can use long range photography to get the 411. Software now can even take into account the rotation of a key in a picture.
It might sound simple. But the best way to attack a lock is to get ahold of a key that works in it. If you possess the key, even for a short time, you can duplicate it in general. The key tells you all kinds of good stuff about the lock.
You can inspect the cuts made in the key. You can pretty much figure out the type of lock that it fits. Sometimes the actual model number of the lock is stamped on the key. You can measure the depth of the key cuts using tools such as a micrometer, a gauge, or caliper.
Information on locks is not hidden or made obscure. It is out there in the general public. Not too safe. Even the standard sizes of key cuts for all kinds of locks is freely available. Not good if you are truck to deter lock picks.
Here are the pieces of the email that I thought were getting better. They reference some specific units in the FBI. They also put the J. Edgar Hoover postal address in the email. And get this. They even make reference to the fact that there are some scammers out there that I may have lost money to! Precious.
Where do they continue to foul up? Well the email came from somewhere in France. Umm the FBI sends email from fbi.gov, right? They also want me to send my $250 to someone using their Gmail address. Once again, wrong domain. Gmail put all kinds of warnings around this email stating that it is most likely a ploy to steal my money.
Nice try guys. You are indeed stepping up your scamming skills. But you have not hit the home run yet. When will they ever learn?