Intermediate Physical Security
Offered By: YouTube
Course Description
Overview
Explore intermediate physical security techniques in this 49-minute conference talk from BSides Tampa 2019. Delve into various lock and door bypass methods, including padlock shims, overlifting attacks, and keyed alike systems. Learn about specific vulnerabilities in popular security devices such as the Masterlock M175 and Linear A126. Discover how to bypass tamper switches, exploit REX sensors, and understand the weaknesses of Knox boxes. Gain insights into advanced topics like 3D printed keys and construction cor systems. This comprehensive overview equips security professionals with knowledge to identify and address common physical security weaknesses in various environments.
Syllabus
Intro
Terminology - Padlock
Padlock Shims
Shim-proof Padlock
Silver Bullet
Overlifting / Comb Attacks
Masterlock M175 Bypass
Keyed Alike Systems (Common Keys)
Keyed Alike Systems - Construction Cor
Linear A126 3D Printed Key
Linear Tamper Switch Bypass
Latch Guards
Various Door Bypasses - BLEKey
REX Sensors
Knox Boxes
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube