Physical Security: From Locks to Dox

Size: px
Start display at page:

Download "Physical Security: From Locks to Dox"

Transcription

1 Physical Security: From Locks to Dox Introduction to Red Team Physical Security Penetration Testing Jess Hires Jax Locksport

2 Disclaimer This information is to be used for professional and/or hobbyist use only. I am not responsible for any actions you take with the knowledge gained from this presentation. Don't get yourself in trouble. 2

3 About Me Jess Hires Information Security Analyst Founder of Jax Locksport and B-Sides JAX Founder and Coordinator of TOOOL Jax Coordinator of Jax2600/DC904 President of Jacksonville Linux Users Group Teacher of Linux, lock picking, and hacking 3

4 About This Talk Physical Security knowledge can be a critical asset on a Red Team Penetration Test. Touching on Penetration Testing Methodology Heavy on Exploitation 4

5 Topics Covered Penetration Testing Methodology Lock Identification Tools Required Attacking Locking Systems 5

6 Terminology Locksport The practice of picking locks or defeating physical security measures for fun or competition. Physical Security Using physical measures to prevent unauthorized access to valuable data or assets. 6

7 Terminology Penetration Test A test to find weaknesses in an organizations security plans, with a deliverable report of findings and remediation steps. There are several types. Red Team The team that conducts the Penetration Test. Members will often specialize in multiple disciplines, including network security and physical security. 7

8 Penetration Testing Methodology A framework for performing Penetration Tests. Pre-Engagement Interactions Reconnaissance Phase Vulnerability Analysis Phase Exploitation Phase Post-Exploitation Phase 8

9 Phase 1: Pre-Engagement Interactions Make sure your test aligns with your client's needs. Define: Scope Boundaries (off-limits) Trophies Time constraints 9

10 Phase 2: Reconnaissance Know yourself, know your enemy. Most important part of a penetration test Information gathering Passive and Active 10

11 Passive Reconnaissance Reconnaissance that is (virtually) undetectable. Google Maps Website Photos on social media Promotional videos Virtual tours 11

12 Active Reconnaissance Reconnaissance that could be easily detected. Visit the target site Take a tour Get creative 12

13 Phase 3: Vulnerability Analysis Detect weaknesses and potential road blocks. Define Targets Potential Difficulty Potential Value Define Obstacles Things to avoid Determine attack method Plan Exploitation Phase 13

14 Potential Difficulty vs Potential Value Low Difficulty High Difficulty Low Value Maybe a Target Never a Target High Value Always a Target Strategic Target 14

15 Targeting Desk Drawers Low Difficulty, Low Value Usernames and Passwords Personally Identifiable Information (PII) Filing Cabinets Low Difficulty, Low Value More PII and other sensitive information 15

16 Targeting Storage Rooms Low to High Difficulty, Low to High Value Storage media RFID tags Server Rooms Low to High Difficulty, High Value For the network Penetration Test 16

17 Targeting Vaults High Difficulty, High Value Company Secrets Other valuables? 17

18 Obstacles Perimeter Security Fences Guard Stations Locks Identify locks on your targets Higher security locks Security Cameras 18

19 Lock Identification Attacks are much different depending on the lock. Pin/Wafer Tumbler Lock picking, raking, bumping Multiple Dial Combination Lock decoding Single Dial Combination Lock manipulation Electronic Locks shoulder surfing, finger printing RFID Locks tag duplication And many more... 19

20 Pin Tumbler Lock 20

21 Tubular (Ace) Lock 21

22 Wafer Tumbler Lock 22

23 Warded Lock 23

24 Lever Lock 24

25 Multiple Dial Combination Lock 25

26 Single Dial Combination Lock 26

27 Electronic Lock 27

28 Higher Security Locks Some locks will pose more of a threat than others. Pin Tumbler locks with Sidebars Finger Pins and Angled Pins Disc Detainer locks Group 1 Combination locks Other exotic locks 28

29 Medeco Angled key cuts, rotating pins, sidebar 29

30 Medeco 30

31 Medeco 31

32 Medeco 32

33 Schlage Primus Finger pins, sidebar 33

34 Disc Detainer Lock Angled key cuts, rotating discs 34

35 Disc Detainer Lock 35

36 Phase 4: Exploitation Destroy those security mechanisms. Infiltration Social Engineering Bypass Lock Picking Exfiltration Trophies 36

37 Social Engineering Sometimes you can enter an area by tricking a legitimate person to let you in. Badges and Uniforms Delivery/Vendor Visitor New Employee Confidence 37

38 Bypass Doors and locks can sometimes be bypassed entirely, without needing to manipulate a lock. Latch tool Under Door and Push to Exit tools Specialty lock bypass tools Remove door from hinges Drop ceiling and raised floors 38

39 Loiding A flat tool used to depress the plunger of a door lock (called loiding, or carding). Also known as the credit card method Tool is called a loid, also known as Shovit Tool Open Out or Open In doors Not usable on deadbolts Light to moderate forensic evidence 39

40 Shovit Tool 40

41 Shovit Tool Open Out Door 41

42 Under the Door Tool Opens doors with lever handles from the outside. Tool is slid under the door, turned up to catch on door handle, and a wire is used to pull the lever down Easy to make Little to no forensic evidence 42

43 Under the Door Tool 43

44 Push to Exit Tool Open doors with push bars from the outside. Slide tool between the door and frame, turn it so it will strike the push bar, and pull to open the door An air wedge may be used to help the tool fit Easy to make Little to no forensic evidence 44

45 Push to Exit Tool 45

46 Lock Bypass Tools Sometimes the inner workings of a lock can be manipulated without interacting with the pins. Insert tool into keyway, past the core, to interact with internal lock mechanisms Various tools for various locks Specialized situations Little forensic evidence 46

47 Lock Bypass Tools 47

48 Knife Tool 48

49 Drop Ceiling and Raised Floor Harris, Shon. CISSP All-in-One Exam Guide, 6th Edition. New York: McGraw Hill, Print. 49

50 Lock Picking Pick all the locks! Single Pin Picking Raking Small set of tools needed Time depends on lock and skill Light forensic evidence 50

51 Lock Operation A standard pin tumbler lock. 51

52 Lock Operation Pin tumbler lock cutaway. 52

53 Lock Operation Lock with proper key. 53

54 Lock Operation Lock with improper key (one bitting too high). 54

55 Lock Operation Lock with improper key (one bitting too low). 55

56 Single Pin Picking Apply torsion. As a pin binds, lift it to the sheer line. 56

57 Single Pin Picking When a binding pin is set, a different pin will bind. 57

58 Single Pin Picking When all pins are set, the lock will open. 58

59 Raking Try to set many pins quickly. 59

60 Security Pins Various shaped pins for pick resistance. 60

61 Tubular (Ace) Lock 61

62 Specialty Lock Picks Some locks require additional tools and training. Wafer locks Warded lock Tubular (Ace) lock Disc Detainer lock Exotic shaped locks 62

63 Wafer Lock Picks (Jigglers) 63

64 Warded Lock Picks 64

65 Tubular Lock Pick 65

66 Disc Detainer Lock Pick 66

67 Cruciform Keyway Pick 67

68 Pick Gun A pick gun can make quick work of a pin tumbler lock, by snapping all of the pins simultaneously. Also known as Snap Gun Energy exerted on key pins is transferred to driver pins Creates a brief gap between keys pins and drivers pins, allowing the lock to be opened Easy to learn Moderate forensic evidence 68

69 Pick Gun 69

70 Bump Keys Using Bump Keys (or bumping) can also be a very easy way to open a pin tumbler lock. Same principle as a Pick Gun Keys are easily available, and can be duplicated Easy to learn Heavy forensic evidence 70

71 Bump Keys 71

72 Bump Keys and Hammer 72

73 Decoding Many multiple dial combination locks have a notch in each wheel, which can be easily decoded. Decoder Tool Makeshift tools Very quick if it works Little to no forensic evidence 73

74 Decoder Tool 74

75 Multiple Dial Combination Decoding 75

76 Manipulation The Art of Safe Cracking. Uses touch and sight Must be able to visualize internal components Time consuming No tools required Difficult to learn No forensic evidence 76

77 Sargent and Greenleaf

78 S&G 6730 Back 78

79 LaGard 3330 Insides 79

80 Combination Lock Side View 80

81 All Wheels Left Left Contact Point 81

82 All Wheels Left Left Contact Point

83 All Wheels Left Right Contact Point 83

84 All Wheels Left Right Contact Point

85 Manipulation Graph As wheels set, the nose drops into the drive cam. Differences in depth are measurable on the dial. Measure 1/4 or 1/8 of a dial position for precision. Dial every other number and measure the left and right contact points. Mark these on graph paper. Dial stickers are available to help with this Tape with fine markings works well too 85

86 Manipulation Graph 86

87 Some Wheels Set Left Contact Point 87

88 Some Wheels Set Left Contact Point

89 Some Wheels Set Right Contact Point 89

90 Some Wheels Set Right Contact Point

91 LaGard 3330 All Wheels Set 91

92 LaGard 3330 Bolt Retracted 92

93 More About Safe Cracking Safe Cracking for the Computer Scientist by Matt Blaze 93

94 Other Exploitation Activities Getting into a secure area can be of great benefit for the network portion of a penetration test. Install LAN taps Connect drop boxes 94

95 Phase 5: Post-Exploitation Maintaining access and covering your tracks. Key Decoding Key Duplication RFID Tag Duplication 95

96 Key Decoding Use a key gauge to decode keys. Different for each key/lock manufacturer Codes can be used to cut new keys 96

97 Key Gauge 97

98 Key Duplication Creating a duplicate key can ensure future access. Clam Shell duplication tool Used to create a mold, and cast a duplicate key Online key duplication services Only need a photo 98

99 Deliverables Show your client the damage. Findings and Documentation Areas exploited Trophies and Photos 99

100 Questions & Comments Thank you! Jess

Section 2.2 Locks and Keys. Legal Notice

Section 2.2 Locks and Keys. Legal Notice Section 2.2 Locks and Keys Digital security often begins with physical security 1 Legal Notice Laws regarding lock picking vary significantly state-bystate In most states purchase and possession of dedicated

More information

CSE 127 Computer Security

CSE 127 Computer Security CSE 127 Computer Security Fall 2012 Lecture #12 Physical Security Stefan Savage Physical security What is physical security about? Controlling access to a physical space or object Examples: Gates/Barriers

More information

Public-Key Cryptography

Public-Key Cryptography Public-Key Cryptography Separate keys are used for encryption and decryption. Sender Communication channel Recipient encrypt decrypt plaintext ciphertext plaintext plaintext public key private key Attacker

More information

Strengths and Weaknesses of Access Control Systems. Eric Schmiedl and Mike Spindel

Strengths and Weaknesses of Access Control Systems. Eric Schmiedl and Mike Spindel Strengths and Weaknesses of Access Control Systems Eric Schmiedl and Mike Spindel Choosing a System Error rate Environment Cost Physical Vulnerability Additional Constraints Error Rate False Reject Rate

More information

LOCKS AND HIGH INSECURITY: PROTECTING CRITICAL INFRASTRUCTURE

LOCKS AND HIGH INSECURITY: PROTECTING CRITICAL INFRASTRUCTURE LOCKS AND HIGH INSECURITY: PROTECTING CRITICAL INFRASTRUCTURE SECURITY VULNERABILITIES FOR MECHANICAL AND ELECTRONIC LOCKING SYSTEMS THAT ARE USED FOR PROTECTING CRITICAL ASSETS CRITICAL FACILITIES TRANSPORTATION

More information

Degree Key System. Technical Manual

Degree Key System. Technical Manual Degree Key System Technical Manual Copyright 03-04, Sargent Manufacturing Company, an ASSA ABLOY Group company. All rights reserved. Reproduction in whole or in part without the express written permission

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals Security+ Guide to Network Security Fundamentals, Third Edition Chapter 7 Access Control Fundamentals Objectives Define access control and list the four access control models Describe logical access control

More information

MIT Guide to Lock Picking. Ted the Tool

MIT Guide to Lock Picking. Ted the Tool MIT Guide to Lock Picking Ted the Tool September 1, 1991 Distribution Copyright 1987, 1991 Theodore T. Tool. All rights reserved. Permission to reproduce this document on a non-prot basis is granted provided

More information

Ten Things Everyone Should Know About Lockpicking & Physical Security Deviant Ollam

Ten Things Everyone Should Know About Lockpicking & Physical Security Deviant Ollam Ten Things Everyone Should Know About Lockpicking & Physical Security Deviant Ollam Physical security is an oft-overlooked component of data and system security in the technology world. While frequently

More information

Cabinet Locks. Benefits:

Cabinet Locks. Benefits: Cabinet Locks Medeco high security cabinet locks are specifically designed for drawer or cabinet door applications where a conventional utility cam lock may not be suitable. Cabinet locks utilize heavy-duty

More information

OPERATING INSTRUCTIONS FOR

OPERATING INSTRUCTIONS FOR OPERATING INSTRUCTIONS FOR MEDECO KEY MACHINES FOR MEDECO ORIGINAL, BIAXIAL, MEDECO 3, KEYMARK CLASSIC & KEYMARK X4 PRODUCTS MEDECO HIGH SECURITY LOCKS ASSUMES NO RESPONSIBILITY FOR INJURY OR PROPERTY

More information

What locks do I have Timber Doors

What locks do I have Timber Doors What locks do I have Timber Doors Introduction Locking mechanisms on doors are varied and it can be difficult to judge whether what you have is good, bad or indifferent. This information takes you through

More information

Techno Security's Guide to Securing SCADA

Techno Security's Guide to Securing SCADA Techno Security's Guide to Securing SCADA Foreword xxiii Chapter 1 Physical Security: SCADA and the Critical Infrastructure's Biggest Vulnerability 1 Introduction 2 Key Control 3 Check All Locks for Proper

More information

Bellevue School District Centralizes Access Control

Bellevue School District Centralizes Access Control c a s e S T U D Y Woodside Elementary School is one of several new schools in the Bellevue School District that incorporate enhanced security protection. Bellevue School District Centralizes Access Control

More information

Physical Security to mitigate Social Engineering Risks

Physical Security to mitigate Social Engineering Risks 2013 Cl iftonlar Physical Security to mitigate Social Engineering Risks cliftonlarsonallen.com Agenda Background and statistics of physical security Address social engineering risks associated with deficiencies

More information

Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks

Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks Matt Blaze AT&T Labs Research mab@crypto.com, mab@research.att.com 15 September 2002 PREPRINT: This paper can be

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

Palm Beach County Sheriff s Office

Palm Beach County Sheriff s Office Palm Beach County Sheriff s Office Business Security Self Survey Since 1909, the deputies of Palm Beach County have provided a safe environment for hundreds of thousands of people who live, work and visit

More information

Maker: Call a 3D Locksmith How 3D Printing can Defeat Physical Security

Maker: Call a 3D Locksmith How 3D Printing can Defeat Physical Security Paper ID #13406 Maker: Call a 3D Locksmith How 3D Printing can Defeat Physical Security Byron Doyle, Brigham Young University Byron is a recent graduate of Brigham Young University with a Bachelor s of

More information

Keypad Locks User Guide

Keypad Locks User Guide 23780042 Keypad Locks User Guide Keypad Deadbolt (BE365) Keypad Lock (FE575, FE595) Contents Keypad Deadbolt (BE365)... 2 Lock Parts...2 Standard Operation...2 Replacing the Battery...3 Emergency Key Override...3

More information

GATES, GUARDS, AND GADGETS: AN INTRODUCTION TO THE PHYSICAL SECURITY OF IT

GATES, GUARDS, AND GADGETS: AN INTRODUCTION TO THE PHYSICAL SECURITY OF IT GATES, GUARDS, AND GADGETS: AN INTRODUCTION TO THE PHYSICAL SECURITY OF IT Kai Axford, MBA, CPP, CISSP, ACE Manager, IT Security Services Accretive Solutions kaxford@accretivesolutions.com THIS SESSION

More information

OPERATING INSTRUCTIONS FOR THE MODEL 210B-2 SRA

OPERATING INSTRUCTIONS FOR THE MODEL 210B-2 SRA OPERATING INSTRUCTIONS FOR THE MODEL 210B-2 SRA SAFETY PRECAUTIONS FOR THE MODEL 210B-2 SRA System Under Pressure: Shut off air supply and disconnect air hose before disassembling or disconnecting parts.

More information

Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks

Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks Matt Blaze AT&T Labs Research mab@crypto.com, mab@research.att.com PREPRINT 15 Sept 2002 (revised 6 Feb 2003). To

More information

WINDOW REPAIR MANUAL & REFERENCE GUIDE

WINDOW REPAIR MANUAL & REFERENCE GUIDE WINDOW REPAIR MANUAL & REFERENCE GUIDE TABLE OF CONTENTS DOUBLE HUNG & SINGLE HUNG PARTS 4-5 CASEMENT PARTS 6 SCREEN PARTS 7-8 HOW TO REMOVE TILT-IN SASH 9 HOW TO REMOVE A BALANCE 10 HOW TO INSTALL BALANCE

More information

Contents TABLE OF. List of Illustrations... IX. Preface... XV. Chapter 1: How the Burglar Breaks into Your Home... 1

Contents TABLE OF. List of Illustrations... IX. Preface... XV. Chapter 1: How the Burglar Breaks into Your Home... 1 TABLE OF Contents List of Illustrations................................. IX Preface........................................... XV Why You Should Read This Book Burglars Kill Every Security System Can Be

More information

INTRODUCTION TO PENETRATION TESTING

INTRODUCTION TO PENETRATION TESTING 82-02-67 DATA SECURITY MANAGEMENT INTRODUCTION TO PENETRATION TESTING Stephen Fried INSIDE What is Penetration Testing? Terminology; Why Test? Types of Penetration Testing; What Allows Penetration Testing

More information

SIMPLEX UNICAN LOCKS CHANGING THE CODE / COMBINATION 900 Series 1000 Series L1000 Series LP1000 Series EE1000 Series 2000 Series 2015 Series

SIMPLEX UNICAN LOCKS CHANGING THE CODE / COMBINATION 900 Series 1000 Series L1000 Series LP1000 Series EE1000 Series 2000 Series 2015 Series SIMPLEX UNICAN LOCKS CHANGING THE CODE / COMBINATION 900 Series 1000 Series L1000 Series LP1000 Series EE1000 Series 2000 Series 2015 Series 2400/2500 Series 3000 Series 3100 Series Simplex 5000 Series

More information

Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks

Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks Matt Blaze AT&T Labs Research mab@crypto.com, mab@research.att.com PREPRINT 15 Sept 2002 (Revised 2 March 2003).

More information

2. This is a close up of a typical area where the rocker is rusted out leaving holes under where the rocker moulding would be..

2. This is a close up of a typical area where the rocker is rusted out leaving holes under where the rocker moulding would be.. ROCKER PANELS 55,56,57 CHEVY REPLACEMENT Do not throw away any pieces when you first remove them. There are many supports that are not reproduced and will need to be used again. When disassembling try

More information

BODY-12, Door Handle - Removal, Installation, and Adjustment

BODY-12, Door Handle - Removal, Installation, and Adjustment Introduction BODY-12, Door Handle - Removal, Installation, and Adjustment There are many different procedures floating around describing how to replace the door handles on a 944 and every one of them will

More information

John P Zelsnack CISSP/CISM/CRISC/Securty+/ITILv3 Senior Technical Manager/Cyber Security Engineer General Dynamics - Advanced Information Systems

John P Zelsnack CISSP/CISM/CRISC/Securty+/ITILv3 Senior Technical Manager/Cyber Security Engineer General Dynamics - Advanced Information Systems John P Zelsnack CISSP/CISM/CRISC/Securty+/ITILv3 Senior Technical Manager/Cyber Security Engineer General Dynamics - Advanced Information Systems AGENDA Who Am I? Breaking it down Why Do We Care Questions

More information

Protecting your business interests through intelligent IT security services, consultancy and training

Protecting your business interests through intelligent IT security services, consultancy and training Protecting your business interests through intelligent IT security services, consultancy and training The openness and connectivity of the digital economy today provides huge opportunities but also creates

More information

All-Season Sunroom Sliding Glass Door Installation Instructions

All-Season Sunroom Sliding Glass Door Installation Instructions ASRESGD-08 All-Season Sunroom Sliding Glass Door Installation Instructions Panel Frame Door Frame Left Side Foam Insulator IE241 H Bar Assembly Door Frame Top Track Panel Frame Door Frame Right Side Stationary

More information

WESTERVILLE DIVISION OF POLICE Security Survey Checklist: Business

WESTERVILLE DIVISION OF POLICE Security Survey Checklist: Business Business Name: Owner Name: Business Address: Officer: Survey No.: WESTERVILLE DIVISION OF POLICE Security Survey Checklist: Business "Being There When Needed" DOORS 1. Is the exterior doors solid core

More information

Wall Mount Installation and Use

Wall Mount Installation and Use Wall Mount Installation and Use 1. Introduction The Wall Mount works the same way for all Touchfire cases - the one or two row magnet strip on the back of the case is magnetically attracted to the Wall

More information

PERFORMANCE WORK STATEMENT (PWS) COURSE OF INSTRUCTION IN ADVANCED FORCE OPERATIONS FOR. SFG(A) 1-1, Torii Station, Okinawa, Japan

PERFORMANCE WORK STATEMENT (PWS) COURSE OF INSTRUCTION IN ADVANCED FORCE OPERATIONS FOR. SFG(A) 1-1, Torii Station, Okinawa, Japan PERFORMANCE WORK STATEMENT (PWS) COURSE OF INSTRUCTION IN ADVANCED FORCE OPERATIONS FOR SFG(A) 1-1, Torii Station, Okinawa, Japan 28 July 2015 1 1.0 Background: 1 st Battalion, 1 st Special Forces Group

More information

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004L Payment Card Industry (PCI) Physical Security (proposed) 01.1 Purpose The purpose

More information

Supply Chain Security Audit Tool - Warehousing/Distribution

Supply Chain Security Audit Tool - Warehousing/Distribution Supply Chain Security Audit Tool - Warehousing/Distribution This audit tool was developed to assist manufacturer clients with the application of the concepts in the Rx-360 Supply Chain Security White Paper:

More information

Removable cylinders available for kwik re-keying 2004 REKEYING MANUAL

Removable cylinders available for kwik re-keying 2004 REKEYING MANUAL Removable cylinders available for kwik re-keying 2004 REKEYING MANUAL Rekeying Is A Great Customer Service That s Easy To Learn. When customers buy a new entry lockset, deadbolt or handleset, they also

More information

Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers

Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers In support of Vectora's C-TPAT program implementation, these security requirements and guidelines are provided

More information

INSTALLATION AND OPERATING INSTRUCTIONS For Model GL1 Gate Locks

INSTALLATION AND OPERATING INSTRUCTIONS For Model GL1 Gate Locks Securitron Magnalock Corp. www.securitron.com ASSA ABLOY, the global leader Tel 800.624.5625 techsupport@securitron.com in door opening solutions INSTALLATION AND OPERATING INSTRUCTIONS For Model GL1 Gate

More information

Safecracking for the computer scientist

Safecracking for the computer scientist Safecracking for the computer scientist Matt Blaze Department of Computer and Information Science University of Pennsylvania blaze@cis.upenn.edu DRAFT 7 December 2004 (Revised 21 December 2004) DRAFT The

More information

ipad 2 GSM Headphone Jack & SIM Slot Replacement

ipad 2 GSM Headphone Jack & SIM Slot Replacement ipad 2 GSM Headphone Jack & SIM Slot Replacement Replace the Headphone jack/sim slot in your ipad 2 GSM. Written By: Walter Galan INTRODUCTION Use this guide to replace a broken headphone jack or SIM card

More information

Physical Security for Drinking Water Facilities

Physical Security for Drinking Water Facilities Physical Security for Drinking Water Facilities December, 2009 State of Oregon Oregon Health Authority Drinking Water Program In Association with The City of Gresham Water Utilities The City of Portland

More information

GLOSSARY OF LOCK TERMINOLOGY

GLOSSARY OF LOCK TERMINOLOGY GLOSSARY OF LOCK TERMINOLOGY The Master Locksmiths Association has created the following glossary of lock terminology to assist you with your security requirements. Don t forget that your first port of

More information

Date: Business Name: Business Contact Person: Business Address: Business Telephone Number: Alternate Contact Number/Email: Officer: Case No:

Date: Business Name: Business Contact Person: Business Address: Business Telephone Number: Alternate Contact Number/Email: Officer: Case No: ISLE OF PALMS POLICE DEPARTMENT Thomas E. Buckhannon, III, Chief of Police 30 J. C. Long Boulevard Isle of Palms, South Carolina 29451 (843) 886-6522 BUSINESS SECURITY SURVEY Date: Business Name: Business

More information

GARDEN WINDOW GLAZING AND DE-GLAZING INSTRUCTIONS

GARDEN WINDOW GLAZING AND DE-GLAZING INSTRUCTIONS GARDEN WINDOW GLAZING AND DE-GLAZING INSTRUCTIONS DE-GLAZING 1.) If there is any PVC cement covering the joints where external glazing bead strips meet, cut through the cement with a utility knife. 2.)

More information

Physical Security. Paul Troncone CS 996

Physical Security. Paul Troncone CS 996 Physical Security Paul Troncone CS 996 NSTISSI 4011 Building Construction Alarms Access Controls Information Systems Centers Personnel Security Tamper Resistance Goals of Physical Security Safeguard personnel

More information

From the Lab to the Boardroom:

From the Lab to the Boardroom: From the Lab to the Boardroom: How to perform a Security Risk Assessment Like a Professional Doug Landoll, CISSP, CISA General Manager, Security Services En Pointe Technologies dlandoll@enpointe.com (512)

More information

Guide for Non-Profit Housing Societies Security Guide Table of Contents

Guide for Non-Profit Housing Societies Security Guide Table of Contents Guide for Non-Profit Housing Societies Security Guide Table of Contents Chapter 1 - General Security Guidelines Chapter 2 - Target hardening Chapter 3 - Security window bars Chapter 4 - Anti-Graffiti solutions

More information

INSTALL/REMOVAL INSTRUCTIONS: WINDOW REGULATOR

INSTALL/REMOVAL INSTRUCTIONS: WINDOW REGULATOR REMOVAL/INSTALL OF WINDOW REGULATOR (741-306) Honda Accord 2003 07 General Tech Tips: Use painter s tape rather than duct tape to secure window. It will not damage paint or leave sticky residue. A plastic

More information

1000 Series Knob Pushbutton Locks

1000 Series Knob Pushbutton Locks 1000 Series Knob Pushbutton Locks This series is ideal for limiting access in high-traffic areas. Two access control functions are available in addition to standard combination access control: Key Override:

More information

Responsibilities of a Volunteer Leader

Responsibilities of a Volunteer Leader Responsibilities of a Volunteer Leader Inspecting tools for safe conditions. Removing unsafe tools from use and immediately notifying site supervisor. Teaching safe tool use to volunteers on your crew.

More information

http://guninfo.tnet.com

http://guninfo.tnet.com Reconstructed Manual for a PA-63 Double Action Semi-Automatic Pistol 9x18mm Makarov More Gun Info can be found at: http://guninfo.tnet.com The contents of this manual were reconstructed from graphical

More information

Table of Contents: Safety Rules... 1. Safety Selector... 1. Loading the Magazine... 2. Loading Magazine into Rifle... 2. Chambering a Round...

Table of Contents: Safety Rules... 1. Safety Selector... 1. Loading the Magazine... 2. Loading Magazine into Rifle... 2. Chambering a Round... OWNERS MANUAL Table of Contents: Safety Rules... 1 Safety Selector... 1 Loading the Magazine... 2 Loading Magazine into Rifle... 2 Chambering a Round... 3 Chambering a Round (with Carrier in Battery)...

More information

By SP Partners, LLC. www.rainbowatticstair.com INSTALLATION GUIDE. Prestige

By SP Partners, LLC. www.rainbowatticstair.com INSTALLATION GUIDE. Prestige By SP Partners, LLC www.rainbowatticstair.com INSTALLATION GUIDE Prestige IMPORTANT READ THIS FIRST Inspect stair for any damage prior to installation. Stair is NOT to be installed while home is under

More information

Redhawk Network Security, LLC 62958 Layton Ave., Suite One, Bend, OR 97701 sales@redhawksecurity.com 866-605- 6328 www.redhawksecurity.

Redhawk Network Security, LLC 62958 Layton Ave., Suite One, Bend, OR 97701 sales@redhawksecurity.com 866-605- 6328 www.redhawksecurity. Planning Guide for Penetration Testing John Pelley, CISSP, ISSAP, MBCI Long seen as a Payment Card Industry (PCI) best practice, penetration testing has become a requirement for PCI 3.1 effective July

More information

Safety Rules. Car Washes CORPORATE HEADQUARTERS 518 EAST BROAD STREET COLUMBUS, OHIO 43215 614.464.5000 STATEAUTO.COM

Safety Rules. Car Washes CORPORATE HEADQUARTERS 518 EAST BROAD STREET COLUMBUS, OHIO 43215 614.464.5000 STATEAUTO.COM TM Safety Rules Car Washes CORPORATE HEADQUARTERS 518 EAST BROAD STREET COLUMBUS, OHIO 43215 614.464.5000 STATEAUTO.COM TM Disclaimer: The information contained in this publication was obtained from sources

More information

Installation Instructions

Installation Instructions Installation Instructions 1. Position the unit onto bridging packers. These keep the unit away from any water sitting inside the frame. 2. Centralise the unit within the frame and pack the edges with appropriate

More information

WARNING: Important: Keep these instructions for future reference. Gate Instructions (1) Assembly and Installation Instructions

WARNING: Important: Keep these instructions for future reference. Gate Instructions (1) Assembly and Installation Instructions Assembly and Installation Instructions Please read these instructions carefully. Please follow these instructions carefully to ensure that your gate extension is properly installed. Improper installation

More information

An ASSA ABLOY Group brand. 4800LN Series. Interconnected Locks

An ASSA ABLOY Group brand. 4800LN Series. Interconnected Locks An ASSA ABLOY Group brand 4800LN Series Interconnected Locks performance meets style introduction The Yale 4800LN series interconnected locksets combine our key-in-lever locksets with the added safety

More information

Master Code 2. Troubleshooting: Installation 7. Troubleshooting: Door Jamming and Door Handing 8. Troubleshooting: Keypad 12

Master Code 2. Troubleshooting: Installation 7. Troubleshooting: Door Jamming and Door Handing 8. Troubleshooting: Keypad 12 Programming and Troubleshooting Guide 1 2 3 4 5 6 Master Code 2 Troubleshooting: Installation 7 Troubleshooting: Door Jamming and Door Handing 8 Troubleshooting: Keypad 12 Troubleshooting: Battery 13 Battery

More information

Security Through Transparency: An Open Source Approach to Physical Security

Security Through Transparency: An Open Source Approach to Physical Security Security Through Transparency: An Open Source Approach to Physical Security John Loughlin Stanton Concepts Lebanon, NJ jpl@stantonconcepts.us Security through obscurity has never been a sensible approach

More information

Georgia Performance Standards Framework for Physical Science 8 th GRADE. Unit: Fast and Furious Forces General Task Life is Easy with Simple Machines

Georgia Performance Standards Framework for Physical Science 8 th GRADE. Unit: Fast and Furious Forces General Task Life is Easy with Simple Machines Subject Area: Physical Science Grade: 8 Unit: Fast and Furious Forces General Task Life is Easy with Simple Machines S8P3. Students will investigate relationship between force, mass, and the motion of

More information

Technical Testing. Network Testing DATA SHEET

Technical Testing. Network Testing DATA SHEET DATA SHEET Technical Testing Network Testing The Dell SecureWorks Technical Testing services deliver the independent expertise, experience and perspective you need to enhance your security posture, reduce

More information

Series 18 Pass Thru Air Lock Cleanroom Entry System

Series 18 Pass Thru Air Lock Cleanroom Entry System OPERATION & MAINTENANCE INSTRUCTIONS FOR Series 18 Pass Thru Air Lock Cleanroom Entry System SOLUTIONS BUILT TO YOUR SPECIFICATIONS 8605 Wyoming Ave. N. Minneapolis MN 55445 fax: 763.425.2004 e-mail: sales@cleanairproducts.com

More information

ALBINS SEQUENTIAL SHIFTER

ALBINS SEQUENTIAL SHIFTER ALBINS SEQUENTIAL SHIFTER Updated 12/11/11 8-AGB5-INST GENERAL NOTES The Albins Sequential Shifter is specifically designed for AGB transaxles. It features an integral reverse lockout lever and has a position

More information

GLOCK "SAFE ACTION" Gen4 GEN4 PISTOLS NEXT GENERATION OF PERFECTION

GLOCK SAFE ACTION Gen4 GEN4 PISTOLS NEXT GENERATION OF PERFECTION GLOCK "SAFE ACTION" GEN4 PISTOLS Gen4 NEXT GENERATION OF PERFECTION GLOCK GEN4 PISTOL SET The Gen4, just like any GLOCK pistol has the same time tested - Safe Action system - durable exterior finish -

More information

Cable Drum Installation

Cable Drum Installation 20 Cable Drum Installation COUNTERBALANCE None Shake the TorqueMaster spring tube gently to extend the winding shafts out about 5" on each side. For single spring applications, there will be no left hand

More information

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1 Threats and Attacks Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to:

More information

INSTRUCTIONS: LocknCharge Laptop Carts

INSTRUCTIONS: LocknCharge Laptop Carts INSTRUCTIONS: LocknCharge Laptop Carts www.lockncharge.com Extra Tools required: Hammer, Philips head screwdriver, medium adjustable spanner. (Allen key supplied) (Panel colours for illustration purposes

More information

Business Protection Online Activity Store Self Assessment

Business Protection Online Activity Store Self Assessment Business Protection Online Activity Store Self Assessment Complete each question in the Business Protection Online Activity Store Self Assessment. The selfassessment covers potential areas of vulnerability,

More information

Back, start, and search key... 3. Lock the keys and screen... 6. Unlock the keys and screen... 7. Set the keys and screen to lock automatically...

Back, start, and search key... 3. Lock the keys and screen... 6. Unlock the keys and screen... 7. Set the keys and screen to lock automatically... Userguide Nokia Lumia 620 Table of Contents Keys and parts... 3 Back, start, and search key... 3 How to Insert a SIM card... 4 First start-up... 6 Switching Phone ON and OFF... 6 Switch the phone on...

More information

PCI (Payment Card Industry) Compliance For Healthcare Offices By Ron Barnett

PCI (Payment Card Industry) Compliance For Healthcare Offices By Ron Barnett PCI (Payment Card Industry) Compliance For Healthcare Offices By Ron Barnett Dr. Svenson thought he was doing both his patients and his practice a big favor when he started setting up monthly payment arrangements

More information

ASSA HIGH SECURITY LOCKS ASSA Twin 6000. ASSA Twin 6000, Twin Exclusive & V10. ASSA cylinders can be supplied in the following keying forms:

ASSA HIGH SECURITY LOCKS ASSA Twin 6000. ASSA Twin 6000, Twin Exclusive & V10. ASSA cylinders can be supplied in the following keying forms: ASSA Twin 6000 ASSA Twin 6000, Twin Exclusive & V10 Combining uncompromising physical security with the highest level of Key control, ASSA high security cylinders offer the ideal solution for situations

More information

Written By: Walter Galan

Written By: Walter Galan ipad 2 GSM Front Panel Replacement Replace the front panel in your ipad 2 GSM. Written By: Walter Galan INTRODUCTION Note: this is a complete guide for replacing a plain front panel. If you have a Front

More information

Sargent and Greenleaf Mechanical Safe Lock Guide

Sargent and Greenleaf Mechanical Safe Lock Guide Sargent and Greenleaf Mechanical Safe Lock Guide Sargent and Greenleaf is a company dedicated to providing security. Not just a sense of security, but real security designed to meet real-world needs. We

More information

More effective protection for your access control system with end-to-end security

More effective protection for your access control system with end-to-end security More effective protection for your access control system with end-to-end security By Jeroen Harmsen The first article on end-to-end security appeared as long ago as 1981. The principle originated in ICT

More information

BOBBIN WINDER - TYPES & FUNCTION

BOBBIN WINDER - TYPES & FUNCTION BOBBIN WINDER - TYPES & FUNCTION 13.1.006 The bobbin winder is a separate unit screwed on to the machine, adjacent to the balance wheel. Its function is to wind a reserve of cotton evenly onto an empty

More information

3. Loosen 3 x grub screws in the Dec end cap and unscrew the cap and counterweight shaft. NEQ6 Belt Modification Kit.

3. Loosen 3 x grub screws in the Dec end cap and unscrew the cap and counterweight shaft. NEQ6 Belt Modification Kit. NEQ6 Belt Modification Kit. Thank you for your purchase. Please read these instructions fully before fitting. Your package should contain 2 off 47 & 2 off 12 tooth aluminium pulleys 2 off belts 6mm wide

More information

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006 Reverse Shells Enable Attackers To Operate From Your Network Richard Hammer August 2006 Reverse Shells? Why should you care about reverse shells? How do reverse shells work? How do reverse shells get installed

More information

WIRE ROPE CUTTERS. Designed for new and unused wire rope. Since 1928

WIRE ROPE CUTTERS. Designed for new and unused wire rope. Since 1928 WIRE ROPE CUTTERS Designed for new and unused wire rope Since 1928 IMPACT 101 104 106 108 103 105 107 109 Model 1 (light duty): Model 1 3 /4 capacity 101 Cutter complete 8 lbs. 102 Casting base 4 lbs.

More information

Retrofit Instructions Installing a Sport Heated Steering Wheel - Leather, Multifunction BMW X5, E53, 2001 2006

Retrofit Instructions Installing a Sport Heated Steering Wheel - Leather, Multifunction BMW X5, E53, 2001 2006 Retrofit Instructions Installing a Sport Heated Steering Wheel - Leather, Multifunction BMW X5, E53, 2001 2006 Disclaimer: This set of instructions is simply a guide on how I installed my own heated steering

More information

Physical Security Assessments. Tom Eston Spylogic.net

Physical Security Assessments. Tom Eston Spylogic.net Physical Security Assessments Tom Eston Spylogic.net Topics Convergence of Physical and Logical Assessment Methodologies Planning the Assessment Team Structure Reconnaissance Penetration Phase Walk Through

More information

DAtA security. the protection Of your INfORMAtION. Is OuR prime DIREctIVE

DAtA security. the protection Of your INfORMAtION. Is OuR prime DIREctIVE DAtA security the protection Of your INfORMAtION Is OuR prime DIREctIVE OVERVIEW building security theft alarms point of entry interior & exterior closed-circuit camera monitoring impact-resistant windows

More information

SHIFT INTERLOCK SYSTEM SHIFT INTERLOCK SYSTEM

SHIFT INTERLOCK SYSTEM SHIFT INTERLOCK SYSTEM SHIFT INTERLOCK SYSTEM The shift lock system is designed to ensure the proper operation of the automatic transmission. The driver must depress the brake pedal in order to move the gear selector from Park

More information

Understanding Access Control

Understanding Access Control Understanding Access Control To understand access control, we must understand the language of the industry. Terms like alarm inputs, relays, timezones, anti-passback, shunt, and access levels are commonly

More information

Commercial or Business Security Survey

Commercial or Business Security Survey Exterior Grounds Commercial or Business Security Survey Is there a fence around the property or a clear definition of Territoriality? If there is a fence, is it tall enough and maintained in good repair?

More information

How To Use A Magistrate Desktop Computer

How To Use A Magistrate Desktop Computer Windows 7 Tips and Tricks 2013 Fall Magistrates Conference (This page left blank) Magistrate Laptops Page 2 Purpose: Magistrates desktop computers are being replaced with a laptop, external monitor, docking

More information

SECURITY VS. EXITING... Door Locking Hardware in Schools DIVISION OF THE STATE ARCHITECT

SECURITY VS. EXITING... Door Locking Hardware in Schools DIVISION OF THE STATE ARCHITECT SECURITY VS. EXITING... Door Locking Hardware in Schools DIVISION OF THE STATE ARCHITECT G U I D E L I N E S DSA Guidelines for Door Locking Hardware in Schools Egress doors shall be readily openable from

More information

Penetration Testing. Presented by

Penetration Testing. Presented by Penetration Testing Presented by Roadmap Introduction to Pen Testing Types of Pen Testing Approach and Methodology Side Effects Demonstration Questions Introduction and Fundamentals Penetration Testing

More information

The Basics of Robot Mazes Teacher Notes

The Basics of Robot Mazes Teacher Notes The Basics of Robot Mazes Teacher Notes Why do robots solve Mazes? A maze is a simple environment with simple rules. Solving it is a task that beginners can do successfully while learning the essentials

More information

Seventh Avenue Inc. 1

Seventh Avenue Inc. 1 Seventh Avenue Inc. Supply Chain Security Profile Customs-Trade Partnership against Terrorism Supplier Questionnaire Seventh Avenue is a member of the Customs-Trade Partnership against Terrorism (C-TPAT).

More information

White Paper FIRE DOOR INSPECTIONS, REPAIRS AND LABELING

White Paper FIRE DOOR INSPECTIONS, REPAIRS AND LABELING INTRODUCTION When the 2012 edition of the Life Safety Code is adopted by the Centers for Medicare Services (CMS) the following accreditation organizations The Joint Commission, AOA Healthcare Facilities

More information

PANELIZED HOME INSTALLATION GUIDELINE

PANELIZED HOME INSTALLATION GUIDELINE PANELIZED HOME INSTALLATION GUIDELINE A typical home package will be constructed of Snap-N-Lock Insulated Panels clad with steel skins. 4" panels will be used for the walls, and 6" panels for the roof.

More information

This directive establishes Department of Homeland Security (DHS) policy regarding the physical protection of facilities and real property.

This directive establishes Department of Homeland Security (DHS) policy regarding the physical protection of facilities and real property. Department of Homeland Security Management Directives System MD Number: 11030.1 Issue Date: 04/21/2003 PHYSICAL PROTECTION OF FACILITIES AND REAL PROPERTY I. Purpose This directive establishes Department

More information

DIRECTIONS FOR ASSEMBLING BASE & WALL CABINETS

DIRECTIONS FOR ASSEMBLING BASE & WALL CABINETS DIRECTIONS FOR ASSEMBLING BASE & WALL CABINETS TheRTAStore.com STEP 1: CLEAR A WORK SPACE Place your RTA cabinet panels on a smooth, scratch resistant surface in a large, open area. (Some people like to

More information

What is Penetration Testing?

What is Penetration Testing? White Paper What is Penetration Testing? An Introduction for IT Managers What Is Penetration Testing? Penetration testing is the process of identifying security gaps in your IT infrastructure by mimicking

More information

INSTALLATION INSTRUCTIONS IMPERVIA (Vent and Fixed) AWNING, CASEMENT, and LARGE AWNING WINDOW WITH FINS

INSTALLATION INSTRUCTIONS IMPERVIA (Vent and Fixed) AWNING, CASEMENT, and LARGE AWNING WINDOW WITH FINS 2009 Pella Corporation INSTALLATION INSTRUCTIONS IMPERVIA (Vent and Fixed) AWNING, CASEMENT, and LARGE AWNING WINDOW WITH FINS Part Number: 80WH0100 Installation Instructions for Typical Wood Frame Construction.

More information